Vulnerability Description
Directory traversal vulnerability in aws_tmxn.exe in the Admin Agent service in the server in EMC Documentum ApplicationXtender Workflow, possibly 5.40 SP1 and earlier, allows remote attackers to upload arbitrary files, and execute arbitrary code, via directory traversal sequences in requests to TCP port 2606.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Emc | Documentum Applicationxtender Workflow Manager | <= 5.40 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/37070Vendor Advisory
- http://www.zerodayinitiative.com/advisories/ZDI-08-095/
- http://secunia.com/advisories/37070Vendor Advisory
- http://www.zerodayinitiative.com/advisories/ZDI-08-095/
FAQ
What is CVE-2008-3685?
CVE-2008-3685 is a vulnerability with a CVSS score of 10.0 (HIGH). Directory traversal vulnerability in aws_tmxn.exe in the Admin Agent service in the server in EMC Documentum ApplicationXtender Workflow, possibly 5.40 SP1 and earlier, allows remote attackers to uplo...
How severe is CVE-2008-3685?
CVE-2008-3685 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-3685?
Check the references section above for vendor advisories and patch information. Affected products include: Emc Documentum Applicationxtender Workflow Manager.