| VID |
18015 |
| Severity |
20 |
| Port |
25 |
| Protocol |
TCP |
| Class |
SMTP |
| Detailed Description |
The SMTP server answers to the VRFY command. This command allows an attacker to determine if an account exists on a system, providing significant assistance to a brute force attack on user accounts. and Some of smtp versions can allow a buffer overflow by too long argument of this command.
* References: http://www.sendmail.org/ http://www.iss.net/security_center/static/887.php ftp://ftp.cs.berkeley.edu/ucb/sendmail |
| Recommendation |
Your mailer should not allow remote users to use any of these commands, because it gives them too much informations.
To remove the VRFY command, 1. add the option 'O PrivacyOptions=goaway' or 'O PrivacyOptions=authwarning,noexpn,novrfy' in /etc/sendmail.cf file. (Some of versions often add the option 'Opnovrfy') 2. revoke 'sendmail' daemon.
Newer versions of Sendmail are available at http://www.sendmail.org or from ftp://ftp.cs.berkeley.edu/ucb/sendmail. |
| Related URL |
(CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|