New plugin for sendmail.

From: Vincent Renardias (vincentat_private)
Date: Sat Mar 29 2003 - 12:51:05 PST

  • Next message: Michel Arboi: "New version of ftp_traversal.nasl"

    see attached file.
    
    
    -- 
    Vincent Renardias <vincentat_private>
    
    
    #
    # This script was written by Vincent Renardias <vincentat_private>
    # Based on sendmail_header.nasl.
    #
    # License: GPLv2
    #
    # Ref:
    # Date: Sat, 29 Mar 2003 11:19:48 -0800
    # From: Claus Assmann <ca+announceat_private>
    # To: bugtraqat_private, vulnwatchat_private
    # Message-ID: <20030329111948.C17695at_private>
    # Subject: sendmail 8.12.9 available
    #
    # Probably related to:
    # From: nag <malazabaat_private>
    # To: FULL-DISCLOSURE <full-disclosureat_private>, vulndiscuss <vulndiscussat_private>
    # List-Archive: <http://lists.netsys.com/pipermail/full-disclosure/>
    # Date: Tue, 19 Nov 2003 13:55:40 +0100
    # Subject: [Full-Disclosure] sendmail vunerability?
    #
    
    if(description)
    {
     script_id(FIXME);
     #script_cve_id(UNASSIGNED_FOR_NOW);
     #script_bugtraq_id(UNASSIGNED_FOR_NOW);
     script_version("$Revision$");
     
     name["english"] = "Sendmail remote undisclosed flaw";
     script_name(english:name["english"]);
     
     desc["english"] = "
    The remote sendmail server, according to its version number,
    is vulnerable to a remote flaw allowing remote users to gain
    root privileges.
    
    Sendmail versions older than 8.12.8 are vulnerable.
    
    *** Nessus reports this vulnerability using only
    *** information that was gathered.
    
    Solution : Upgrade to Sendmail ver 8.12.9 or greater or
    if you cannot upgrade, apply patches for 8.10-12 here:
    
    http://www.sendmail.org/patchps.html
    
    NOTE: manual patches do not change the version numbers.
    Vendors who have released patched versions of sendmail
    may still falsely show vunerabilty.
    
    Risk factor : High";
    	
     script_description(english:desc["english"]);
     
     summary["english"] = "Checks the version number"; 
     script_summary(english:summary["english"]);
     
     script_category(ACT_GATHER_INFO);
     
     script_copyright(english:"This script is Copyright (C) 2003 StrongHoldNet");
     
     family["english"] = "SMTP problems";
     script_family(english:family["english"]);
     script_dependencie("find_service.nes", "smtpserver_detect.nasl");
     script_require_ports("Services/smtp", 25);
     script_require_keys("SMTP/sendmail");
     exit(0);
    }
    
    #
    # The script code starts here
    #
    
    include("smtp_func.inc");
    
    port = get_kb_item("Services/smtp");
    if(!port) port = 25;
    
    banner = get_smtp_banner(port:port);
    if(banner) {
      if(ereg(pattern:".*Sendmail.*(Switch\-((1\.)|(2\.(0\.|1\.[0-4])))|(\/|UCB| )([5-7]\.|8\.([0-9](\.|;|$)|1[01]\.|12\.[0-8](\/| |\.|\+)))).*", string:banner, icase:TRUE))
    		security_hole(port);
      else if(ereg(pattern:".*Sendmail (5\.79.*|5\.[89].*|[67]\..*|8\.[0-9]\..*|8\.1[01]\..*|8\.12\.[0-8])/.*",
      		string:banner, icase:TRUE))
     	security_hole(port);
    }
    



    This archive was generated by hypermail 2b30 : Sat Mar 29 2003 - 12:51:08 PST