| VID |
25019 |
| Severity |
40 |
| Port |
4100, ... |
| Protocol |
TCP |
| Class |
DB |
| Detailed Description |
The Sybase database server has the default account(s). Anyone can connect to it and do whatever she and he want to your data deleting a database, adding bogus entries, ... Specially the sa account with a blank password can lead to compromises of your security. The sa account is targeted by unauthorized users because it is a well known account that cannot be removed and because this account has unlimited access.
* Platforms Affected: Sybase Any version
* References: http://www.iss.net/security_center/static/1055.php http://www.iss.net/security_center/static/3607.php http://www.iss.net/security_center/static/3785.php |
| Recommendation |
If the account is not needed, lock or delete the account from the system.
If the account is required, change the default login and password to a value that is difficult to guess. If the sa account exists in the server, lock the accout through the following steps:
1. The sa account can be locked using Sybase Central. 2. Select the Logins folder after logging into the server. 3. Right-click on the sa login ID and select the Properties option. 4. Under the Parameters tab, check the 'Account is locked' checkbox. 5. Click 'OK' button. |
| Related URL |
(CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|