top of page
作家相片Samuel

Nmap NSE Category vulns Script:smtp-vuln-cve2011-1720 檢查Postfix SMTP服務器在使用Cyrus SASL庫認證機制時的內存損壞問題

已更新:8月6日


Nmap Script摘要


檢查 Postfix SMTP 服務器在使用 Cyrus SASL 庫認證機制時的內存損壞問題(CVE-2011-1720)。這個漏洞可能允許拒絕服務攻擊並且可能導致遠程代碼執行。


參考資料:


Nmap Script參數


smtp.domain

參見smtp庫的文檔。

smbdomain, smbhash, smbnoguest, smbpassword, smbtype, smbusername

參見smbauth庫的文檔。

vulns.short, vulns.showall

參見vulns庫的文檔。


Nmap Script範例


nmap --script=smtp-vuln-cve2011-1720 --script-args='smtp.domain=<domain>' -pT:25,465,587 <host>

Nmap Script輸出

PORT   STATE SERVICE
25/tcp open  smtp
| smtp-vuln-cve2011-1720:
|   VULNERABLE:
|   Postfix SMTP server Cyrus SASL Memory Corruption
|     State: VULNERABLE
|     IDs:  CVE:CVE-2011-1720  BID:47778
|     Description:
|       The Postfix SMTP server is vulnerable to a memory corruption vulnerability
|       when the Cyrus SASL library is used with authentication mechanisms other
|       than PLAIN and LOGIN.
|     Disclosure date: 2011-05-08
|     Check results:
|       AUTH tests: CRAM-MD5 NTLM
|     Extra information:
|       Available AUTH MECHANISMS:  CRAM-MD5 DIGEST-MD5 NTLM PLAIN LOGIN
|     References:
|       http://www.postfix.org/CVE-2011-1720.html
|       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1720
|_      https://www.securityfocus.com/bid/47778

Nmap Script作者:

Djalal Harouni

License: Same as Nmap--See https://nmap.org/book/man-legal.html


Nmap
Nmap

 

延伸閱讀

2 次查看

Comments


bottom of page