|Title:||Debian GNU/Linux Sendmail Default SASL Password|
|Summary:||Checks SMTP authentication|
The remote host is running a Sendmail server with a default SASL
password of 'sendmail' / 'sendmailpwd'.
A spammer may use this account to use the remote server as a spam relay
for the internet.
See also : http://www.debian.org/security/2004/dsa-554
Solution : Disable this account as soon as possible
Risk factor : High
BugTraq ID: 11262|
Common Vulnerability Exposure (CVE) ID: CVE-2004-0833
Debian Security Information: DSA-554 (Google Search)
XForce ISS Database: sendmail-mail-relay(17531)
|Copyright||This script is Copyright (C) 2004 Tenable Network Security|
|This is only one of 40037 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.