smtp-vuln-cve2011-1720
脚本使用类型:
portrule
脚本所属分类:
intrusive, vuln
脚本下载地址: http://nmap.org/svn/scripts/smtp-vuln-cve2011-1720.nse
Checks for a memory corruption in the Postfix SMTP server when it uses Cyrus SASL library authentication mechanisms (CVE-2011-1720). This vulnerability can allow denial of service and possibly remote code execution.
Reference:
Define the domain to be used in the SMTP EHLO command.
执行格式
nmap --script=smtp-vuln-cve2011-1720 --script-args='smtp.domain=<domain>' -pT:25,465,587 <host>
PORT STATE SERVICE 25/tcp open smtp | smtp-vuln-cve2011-1720: | VULNERABLE: | Postfix SMTP server Cyrus SASL Memory Corruption | State: VULNERABLE | IDs: CVE:CVE-2011-1720 OSVDB:72259 | Description: | The Postfix SMTP server is vulnerable to a memory corruption vulnerability | when the Cyrus SASL library is used with authentication mechanisms other | than PLAIN and LOGIN. | Disclosure date: 2011-05-08 | Check results: | AUTH tests: CRAM-MD5 NTLM | Extra information: | Available AUTH MECHANISMS: CRAM-MD5 DIGEST-MD5 NTLM PLAIN LOGIN | References: | http://www.postfix.org/CVE-2011-1720.html | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1720 |_ http://osvdb.org/72259
Author: Djalal Harouni
License: VER007 整理 http://www.ver007.com