|CVSS SCORE||10.0, (AV:N/AC:L/Au:N/C:C/I:C/A:C)|
|TREND MICRO CUSTOMER PROTECTION||Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['10911']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com|
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Sybase MBusiness Anywhere. Authentication is not required to exploit this vulnerability.
The flaw exists within the agd.exe component which listens by default on TCP port 80 and 443. When calling agd!encodeUsername the process creates a 100 byte buffer on the heap. The process then blindly copies user supplied data into that fixed-length buffer without verifying that the size of the destination buffer is adequately sized. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the SYSTEM user.
Sybase has issued an update to correct this vulnerability. More details can be found at: