![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.80102 |
Category: | Denial of Service |
Title: | Sendmail 'smad' Vulnerability |
Summary: | The remote host is subject to the 'smad' (sendmail accept dos); attack. |
Description: | Summary: The remote host is subject to the 'smad' (sendmail accept dos) attack. Vulnerability Insight: Smad prevents Sendmail from accepting legitimate connections. An attacker may use this flaw to prevent you from receiving any email, thus lowering the interest of being connected to internet. This attack is specific to some versions of the Linux kernel. There are various security bugs in the implementation of this service which can be used by an intruder to gain a root account rather easily. Solution: Upgrade your Linux kernel to a newer version or filter incoming traffic to this port. CVSS Score: 7.8 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C |
Copyright | Copyright (C) 2009 Vlatko Kosturjak |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |