File: 660.txt

package info (click to toggle)
snort 2.3.3-11
  • links: PTS
  • area: main
  • in suites: etch, etch-m68k
  • size: 22,512 kB
  • ctags: 11,344
  • sloc: ansic: 70,967; sh: 4,848; makefile: 748; perl: 478; sql: 212
file content (55 lines) | stat: -rw-r--r-- 1,403 bytes parent folder | download | duplicates (8)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55

--
Sid:
660

--
Summary:
This event is generated when an attempt is made to expand the alias of root on a Sendmail server.

--
Impact:
Reconnaissance.  This is an attempt to discover email addresses associated with the alias of root for a Sendmail server.

--
Detailed Information:
An attacker may probe for email addresses associated with the alias of root on a Sendmail server.  The "expn" command expands the alias into a list of actual recipients associated with the alias.  This command can be used to determine who reads the mail sent to the administrator.  It may be used by spammers to get valid email accounts or may be used to discover valid accounts on the Sendmail server.

--
Affected Systems:
Versions of Sendmail that do not disable expn.

--
Attack Scenarios:
An attacker can telnet to the Sendmail server and issue the command "expn root" to gather email addresses associated with the alias of root.

--
Ease of Attack:
Easy.  Telnet to the Sendmail server and issue the command "expn root". 

--
False Positives:
None Known.

--
False Negatives:
None Known.

--
Corrective Action:
Edit the /etc/sendmail.cf file to disable expn by setting PrivacyOptions=noexpn. 

--
Contributors:
Original rule written by Max Vision <vision@whitehats.com>
Sourcefire Research Team
Judy Novak <judy.novak@sourcefire.com>

--
Additional References:

Arachnids:
http://www.whitehats.com/info/IDS31


--