Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2011-0496
Deferred
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-20 Jan, 2011 | 19:00
Updated At-11 Apr, 2025 | 00:51

Unspecified vulnerability in Sybase EAServer 5.x and 6.x before 6.3 ESD#2, as used in Appeon, Replication Server Messaging Edition (RSME), and WorkSpace, allows remote attackers to install arbitrary web services and execute arbitrary code, related to a "design vulnerability."

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.010.0HIGH
AV:N/AC:L/Au:N/C:C/I:C/A:C
Type: Primary
Version: 2.0
Base score: 10.0
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

sybase
sybase
>>appeon_for_powerbuilder>>2.5
cpe:2.3:a:sybase:appeon_for_powerbuilder:2.5:*:*:*:*:*:*:*
sybase
sybase
>>appeon_for_powerbuilder>>2.6
cpe:2.3:a:sybase:appeon_for_powerbuilder:2.6:*:*:*:*:*:*:*
sybase
sybase
>>appeon_for_powerbuilder>>2.7
cpe:2.3:a:sybase:appeon_for_powerbuilder:2.7:*:*:*:*:*:*:*
sybase
sybase
>>appeon_for_powerbuilder>>2.8
cpe:2.3:a:sybase:appeon_for_powerbuilder:2.8:*:*:*:*:*:*:*
sybase
sybase
>>appeon_for_powerbuilder>>6.0
cpe:2.3:a:sybase:appeon_for_powerbuilder:6.0:*:*:*:*:*:*:*
sybase
sybase
>>appeon_for_powerbuilder>>6.1
cpe:2.3:a:sybase:appeon_for_powerbuilder:6.1:*:*:*:*:*:*:*
sybase
sybase
>>appeon_for_powerbuilder>>6.2
cpe:2.3:a:sybase:appeon_for_powerbuilder:6.2:*:*:*:*:*:*:*
sybase
sybase
>>appeon_for_powerbuilder>>6.5
cpe:2.3:a:sybase:appeon_for_powerbuilder:6.5:*:*:*:*:*:*:*
sybase
sybase
>>easerver>>5.0
cpe:2.3:a:sybase:easerver:5.0:*:*:*:*:*:*:*
sybase
sybase
>>easerver>>5.0.1
cpe:2.3:a:sybase:easerver:5.0.1:*:*:*:*:*:*:*
sybase
sybase
>>easerver>>5.1
cpe:2.3:a:sybase:easerver:5.1:*:*:*:*:*:*:*
sybase
sybase
>>easerver>>5.2
cpe:2.3:a:sybase:easerver:5.2:*:*:*:*:*:*:*
sybase
sybase
>>easerver>>5.2.1
cpe:2.3:a:sybase:easerver:5.2.1:*:*:*:*:*:*:*
sybase
sybase
>>easerver>>5.3
cpe:2.3:a:sybase:easerver:5.3:*:*:*:*:*:*:*
sybase
sybase
>>easerver>>5.5
cpe:2.3:a:sybase:easerver:5.5:*:*:*:*:*:*:*
sybase
sybase
>>easerver>>6.0
cpe:2.3:a:sybase:easerver:6.0:*:*:*:*:*:*:*
sybase
sybase
>>easerver>>6.0.2
cpe:2.3:a:sybase:easerver:6.0.2:*:*:*:*:*:*:*
sybase
sybase
>>easerver>>6.1
cpe:2.3:a:sybase:easerver:6.1:*:*:*:*:*:*:*
sybase
sybase
>>easerver>>6.2
cpe:2.3:a:sybase:easerver:6.2:*:*:*:*:*:*:*
sybase
sybase
>>easerver>>6.3
cpe:2.3:a:sybase:easerver:6.3:*:*:*:*:*:*:*
sybase
sybase
>>easerver>>6.3.1
cpe:2.3:a:sybase:easerver:6.3.1:*:*:*:*:*:*:*
sybase
sybase
>>replication_server>>*
cpe:2.3:a:sybase:replication_server:*:*:messaging:*:*:*:*:*
sybase
sybase
>>replication_server>>15.2
cpe:2.3:a:sybase:replication_server:15.2:*:messaging:*:*:*:*:*
sybase
sybase
>>sybase_workspace>>*
cpe:2.3:a:sybase:sybase_workspace:*:*:*:*:*:*:*:*
sybase
sybase
>>sybase_workspace>>1.0
cpe:2.3:a:sybase:sybase_workspace:1.0:*:*:*:*:*:*:*
sybase
sybase
>>sybase_workspace>>1.5
cpe:2.3:a:sybase:sybase_workspace:1.5:*:*:*:*:*:*:*
sybase
sybase
>>sybase_workspace>>1.6
cpe:2.3:a:sybase:sybase_workspace:1.6:*:*:*:*:*:*:*
sybase
sybase
>>sybase_workspace>>1.7
cpe:2.3:a:sybase:sybase_workspace:1.7:*:*:*:*:*:*:*
sybase
sybase
>>sybase_workspace>>2.0
cpe:2.3:a:sybase:sybase_workspace:2.0:*:*:*:*:*:*:*
sybase
sybase
>>sybase_workspace>>2.0.1
cpe:2.3:a:sybase:sybase_workspace:2.0.1:*:*:*:*:*:*:*
sybase
sybase
>>sybase_workspace>>2.0.2
cpe:2.3:a:sybase:sybase_workspace:2.0.2:*:*:*:*:*:*:*
sybase
sybase
>>sybase_workspace>>2.1
cpe:2.3:a:sybase:sybase_workspace:2.1:*:*:*:*:*:*:*
sybase
sybase
>>sybase_workspace>>2.1.2
cpe:2.3:a:sybase:sybase_workspace:2.1.2:*:*:*:*:*:*:*
sybase
sybase
>>sybase_workspace>>2.5
cpe:2.3:a:sybase:sybase_workspace:2.5:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-noinfoPrimarynvd@nist.gov
CWE ID: NVD-CWE-noinfo
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Per: http://www.sybase.com/detail?id=1091057 ' Remote exploitation of a design vulnerability in Sybase EAServer could allow an attacker to install arbitrary web services, this condition can result in arbitrary code execution allowing attacker to gain control over the affected machine. This also affects those products that include EAServer: Appeon, Replication Server Messaging Edition, and WorkSpace.'

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://osvdb.org/70428cve@mitre.org
N/A
http://secunia.com/advisories/42904cve@mitre.org
Vendor Advisory
http://www.securityfocus.com/bid/45809cve@mitre.org
N/A
http://www.sybase.com/detail?id=1091057cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2011/0125cve@mitre.org
Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/64697cve@mitre.org
N/A
http://osvdb.org/70428af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/42904af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securityfocus.com/bid/45809af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.sybase.com/detail?id=1091057af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2011/0125af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/64697af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://osvdb.org/70428
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/42904
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://www.securityfocus.com/bid/45809
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.sybase.com/detail?id=1091057
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://www.vupen.com/english/advisories/2011/0125
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/64697
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://osvdb.org/70428
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/42904
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://www.securityfocus.com/bid/45809
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.sybase.com/detail?id=1091057
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://www.vupen.com/english/advisories/2011/0125
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/64697
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Change History
0Changes found

Details not found