RULE(RULE ID:310959)

Rule General Information
Release Date: 2020-05-18
Rule Name: SAP Sybase Event Stream Processor esp_parse ConnectionType Unsafe Pointer Dereference Vulnerability -3 (CVE-2014-3458)
Severity:
CVE ID:
Rule Protection Details
Description: SAP Sybase Event Stream Processor is a Sybase event stream processor from the German company SAP. It can implement transaction and algorithm monitoring, help users monitor transaction performance indicators, manage automated transaction strategies, etc.There is a remote code execution vulnerability in the SAP Sybase Event Stream Processor. The vulnerability stems from the program's insufficient input from users. An attacker could use this vulnerability to execute arbitrary code in the context of the affected application.
Impact: An attacker could exploit this vulnerability to have unspecified effect.
Affected OS: Windows, Linux, FreeBSD, Solaris, Other Unix, Mac OS
Reference: SecurityFocusBID:67587
https://www.zerodayinitiative.com/advisories/ZDI-14-145/
Solutions
The vendors have released upgrade patches to fix vulnerabilities, please visit:
http://www.sap.com/china/index.html