Vulnerable Systems:
* EAServer prior from 6.3 ESD#2
* EAServer prior from 6.3.1
This condition can result in arbitrary code execution.
The vulnerability is due to a design error which allows a user to install or uninstall web services via a certain web application. This web application is installed by default on the EAServer HTTP Server and does not require authentication.
Exploitation of this vulnerability could allow an attacker to gain execution control over the affected machine.
By specifying a URL to a web service (WDSL) hosted at a remote location, it is possible for an attacker to install a malicious web service on the target Sybase EAServer host. Once installed, the web service can execute on the target host. An attacker may be able to execute arbitrary code or read and write to important system files, which can result in arbitrary code execution.
Workaround:
The vulnerable application is hosted on a HTTP Server. The HTTP Server uses TCP port 8000 by default. This port my be firewalled on the EAServer host.