📄 1446.txt
字号:
Rule:--Sid:1446--Summary:This event is generated when an external attacker uses the "vrfy root"command to find the login name or mail alias of the systemadministrator. This may also indicate a vulnerability scan.--Impact:Information gathering. --Detailed Information:An attacker may be able to obtain the email alias or actual emailaddress of root users. This allows the attacker to know which emailaccounts may be more valuable to target, and can be used by spammers oras targets for denial of service attempts.--Affected Systems:Systems running Sendmail.--Attack Scenarios:An attacker uses vrfy root to obtain the name of administrators on theserver. The attacker now knows which accounts have administrativeaccess, and may use this information to focus later attacks.--Ease of Attack:Simple.--False Positives:None known.--False Negatives:None known.--Corrective Action:Disable the vrfy command on your mail server, or update your Sendmailconfiguration file so that Sendmail displays non-sensitive informationwhen it receives a vrfy root request.--Contributors:Original rule written by Brian Caswell <bmc@sourcefire.com>Sourcefire Vulnerability Research TeamSourcefire Technical Publications TeamJen Harvey <jennifer.harvey@sourcefire.com>--Additional References:RFC 821:http://www.faqs.org/rfcs/rfc821.htmlSecurity Space:http://www.securityspace.com/smysecure/catid.html?viewsrc=1&id=10249--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -