Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Sendmail debug mode leak

Information

Severity

Severity

Low

Family

Family

SMTP problems

CVSSv2 Base

CVSSv2 Base

2.1

CVSSv2 Vector

CVSSv2 Vector

AV:L/AC:L/Au:N/C:P/I:N/A:N

Solution Type

Solution Type

Vendor Patch

Created

Created

18 years ago

Modified

Modified

5 years ago

Summary

According to the version number of the remote mail server, a local user may be able to obtain the complete mail configuration and other interesting information about the mail queue.

Insight

Insight

Even if the attacker is not allowed to access those information directly it is possible to circumvent this restriction by running: sendmail -q -d0-nnnn.xxx where nnnn & xxx are debugging levels. If users are not allowed to process the queue (which is the default) then you are not vulnerable. Note: This vulnerability is _local_ only.

Solution

Solution

Upgrade to the latest version of Sendmail or do not allow users to process the queue (RestrictQRun option)

Common Vulnerabilities and Exposures (CVE)