The remote application server is potentially affected by multiple vulnerabilities.
Description
Sybase EAServer versions 6.3.1 and 6.2 are potentially affected by the following three vulnreabilities: - Directory traversal vulnerabilities due to insufficient user input sanitation in the EAServer redirector plugin, whereby an attacker could list all directories and display arbitrary files on the vulnerable server. - Directory traversal vulnerability due to insufficient user input sanitation via SOAP requests to the server, whereby an attacker could list all directories and display arbitrary files, or use it in conjunction with other vulnerabilities to execute arbitrary commands on the vulnerable system. - OS command execution via the WSH service, which can be used in conjunction with the aforementioned vulnerabilities to run arbitrary commands on the vulnerable system.
Solution
Apply the vendor's EBF file relevant for your platform. (Installations earlier than 6.2 may need to upgrade to newer versions before applying the patch.)