sendmail_debug_leak.nasl

来自「漏洞扫描源码,可以扫描linux,windows,交换机路由器」· NASL 代码 · 共 47 行

NASL
47
字号
# This script was written by Michel Arboi <arboi@alussinan.org>## GPL## References:# From: "Michal Zalewski" <lcamtuf@echelon.pl># To: bugtraq@securityfocus.com# CC: sendmail-security@sendmail.org# Subject: RAZOR advisory: multiple Sendmail vulnerabilitiesif(description){ script_id(11088); script_bugtraq_id(3898); script_cve_id("CVE-2001-0715"); script_version ("$Revision: 38 $");  name["english"] = "Sendmail debug mode leak"; name["francais"] = "Fuite d'information dans le mode debug de sendmail"; script_name(english:name["english"], 	     francais:name["francais"]);  desc["english"] = "According to the version number of the remote mail server, a local user may be able to obtain the complete mail configurationand other interesting information about the mail queue even ifhe is not allowed to access those information directly, by running	sendmail -q -d0-nnnn.xxxwhere nnnn & xxx are debugging levels.If users are not allowed to process the queue (which is the default)then you are not vulnerable.Solution : upgrade to the latest version of Sendmail or do not allow users to process the queue (RestrictQRun option)Risk factor : LowNote : This vulnerability is _local_ only";  desc["francais"] = "D'apr鑣 le num閞o de version du serveur sendmail distant, un utilisateur local peut obtenir des informations sur la configurationdu courrier et sur l'閠at de la file d'attente m阭e s'il n'y a pasacc鑣 directement, en lan鏰nt :	send -q d0-nnnn.xxxo

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?