RULE(RULE ID:306546)

Rule General Information
Release Date: 2020-05-26
Rule Name: SAP Sybase Event Stream Processor esp_parse Connection Unsafe Pointer Dereference Vulnerability -5 (CVE-2014-3457)
Severity:
CVE ID:
Rule Protection Details
Description: SAP Sybase Event Stream Processor is a Sybase event stream processor from the German company SAP. It can implement transaction and algorithm monitoring, help users monitor transaction performance indicators, manage automated transaction strategies. A remote code execution vulnerability exists in SAP Sybase Event Stream Processor. An attacker could use this vulnerability to execute arbitrary code in the context of the affected library. It may also cause denial of service.
Impact: Successful exploitation could result in arbitrary code execution in the context of the affected service.
Affected OS: Windows, Other Unix
Reference: SecurityFocusBID:67585
Solutions
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.