Remote exploitation of a directory traversal vulnerability in Sybase Inc.'s EAServer could allow an attacker to read arbitrary files.
Credit:
The information has been provided by Sow Ching Shiong..
The information has been provided by http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=912.
Vulnerable Systems:
* Sybase EAServer 6.3.1 Developer Edition running on Windows 2003 Server.
The vulnerability is due to a failure by the Sybase EAServer HTTP Server to restrict directory traversals. As a result, sensitive file path locations outside the configured HTTP Server restricted directory can be accessed by an attacker. No authentication is required to access the HTTP Server.
Vendor Status:
Sybase has released a fix which addresses this issue.
Patch Availability:
Information about downloadable vendor updates can be found by clicking on the URLs shown
http://downloads.sybase.com