This script is Copyright (C) 2011 Tenable Network Security, Inc.
The remote SOAP server is vulnerable to a buffer overflow attack.
The Sybase M-Business Anywhere (AvantGo) software installed on the
remote host includes a SOAP server that fails to validate an XML end tag in
a SOAP request, resulting in a buffer overflow.
An unauthenticated, remote attacker can exploit this to execute
This plugin checks the heap overflow condition in the SOAP server by
submitting a request with a long XML end tag.
See also :
Apply the appropriate patch from Sybase.
Note that the patches also address the vulnerabilities reported in
ZDI-11-155 (http://www.zerodayinitiative.com/advisories/ZDI-11-155/) and
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 7.4
Public Exploit Available : false
Family: Gain a shell remotely
Nessus Plugin ID: 54618 ()
Bugtraq ID: 47775