On Apr 25, 2006, at 6:33 PM, Flickema, Drew W. wrote: > > I've seen local check nasl(s) for CVE 2006-0058, but have not seen a > remote detect nasl. Is there any effort with this? I have only found > the original PoC code, but the author, jack@private states > it does not really work well. Is there a working exploit available > and > is it safe or does it crash the service? It is possible to distinguish a patched and unpatched server, however the default timeout for this operation on many sendmail servers is set to 3600 seconds, which makes such a plugin impractical. Also, a banner check definitely is out of the question since every vendor backported the fixes (and compiling sendmail is no fun). The Tenable Passive Vulnerability Scanner has a plugin for this flaw -- one of the advantages of being passive is that you're never really time-constrained. -- Renaud _______________________________________________ Plugins-writers mailing list Plugins-writers@private http://mail.nessus.org/mailman/listinfo/plugins-writers
This archive was generated by hypermail 2.1.3 : Wed Apr 26 2006 - 04:38:03 PDT