📄 sendmail_debug_leak.nasl
字号:
# This script was written by Michel Arboi <arboi@alussinan.org>## GPL## References:# From: "Michal Zalewski" <lcamtuf@echelon.pl># To: bugtraq@securityfocus.com# CC: sendmail-security@sendmail.org# Subject: RAZOR advisory: multiple Sendmail vulnerabilitiesif(description){ script_id(11088); script_bugtraq_id(3898); script_cve_id("CVE-2001-0715"); script_version ("$Revision: 38 $"); name["english"] = "Sendmail debug mode leak"; name["francais"] = "Fuite d'information dans le mode debug de sendmail"; script_name(english:name["english"], francais:name["francais"]); desc["english"] = "According to the version number of the remote mail server, a local user may be able to obtain the complete mail configurationand other interesting information about the mail queue even ifhe is not allowed to access those information directly, by running sendmail -q -d0-nnnn.xxxwhere nnnn & xxx are debugging levels.If users are not allowed to process the queue (which is the default)then you are not vulnerable.Solution : upgrade to the latest version of Sendmail or do not allow users to process the queue (RestrictQRun option)Risk factor : LowNote : This vulnerability is _local_ only"; desc["francais"] = "D'apr鑣 le num閞o de version du serveur sendmail distant, un utilisateur local peut obtenir des informations sur la configurationdu courrier et sur l'閠at de la file d'attente m阭e s'il n'y a pasacc鑣 directement, en lan鏰nt : send -q d0-nnnn.xxxo
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -