Plugin ID | 6 |
Plugin name | SMTP ESMTP detection |
Plugin filename | SMTP ESMTP detection.plugin |
Plugin filesize | 2897 bytes |
Plugin family | SMTP |
Plugin created name | Marc Ruef |
Plugin created email | marc dot ruef at computec dot ch |
Plugin created web | http://www.computec.ch |
Plugin created company | computec.ch |
Plugin created date | 2003/11/13 |
Plugin updated name | Marc Ruef |
Plugin updated email | marc dot ruef at computec dot ch |
Plugin updated web | http://www.computec.ch |
Plugin updated company | computec.ch |
Plugin updated date | 2004/11/13 |
Plugin version | 2.0 |
Plugin changelog | Added the Symantec NetRecon rating in version 1.3. Corrected the plugin structure and added the accuracy values in 1.4. Improved the pattern matching and added the changelog in 2.0. |
Plugin protocol | tcp |
Plugin port | 25 |
Plugin procedure detection | open|sleep|close|pattern_exists 220 *ESMTP* |
Plugin detection accuracy | 90 |
Plugin comment | This plugin was written with the ATK Attack Editor. |
Bug affected | Some enhanced mail transfer agents |
Bug not affected | Especially older mail transfer agents |
Bug vulnerability class | Configuration |
Bug description | With banner-grabbing an attacker can see that this mail server supports ESMTP (Extended Simple Mail Transfer Protocol). ESMTP has additional vulnerabilities, so knowing that a network resource supports it permits an attacker to focus their efforts. |
Bug solution | A service if not needed should be de-installed or disabled. If this is not possible, an access control list (ACL) with firewalling should be applied to this port. Do not allow the web server to include sensitive data (e.g. web server name and version) into the 404 Not Found report. |
Bug fixing time | 30 minutes |
Bug exploit availability | Yes |
Bug remote | Yes |
Bug local | Yes |
Bug severity | Low |
Bug popularity | 9 |
Bug simplicity | 8 |
Bug impact | 5 |
Bug risk | 6 |
Bug Symantec NetRecon rating | 9 |
Bug check tools | Nessus, Symantec NetRecon, ISS Internet Scanner and Dante Security Scanner are able to do the same or a similar check |
Source Literature | Hacking Intern - Angriffe, Strategien, Abwehr, Marc Ruef, Marko Rogge, Uwe Velten and Wolfram Gieseke, November 1, 2002, Data Becker, Düsseldorf, ISBN 381582284X |
Source Misc. | http://www.computec.ch |