Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | |||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.11080 |
Kategorie: | SMTP problems |
Titel: | poprelayd & sendmail authentication problem |
Zusammenfassung: | The remote SMTP server allows relaying for authenticated users.; It is however possible to poison the logs which means that spammers would be able to use; your server to send their e-mails to the world, thus wasting your network bandwidth and getting you; blacklisted.;; *** Some SMTP servers might display a false positive here. |
Beschreibung: | Summary: The remote SMTP server allows relaying for authenticated users. It is however possible to poison the logs which means that spammers would be able to use your server to send their e-mails to the world, thus wasting your network bandwidth and getting you blacklisted. *** Some SMTP servers might display a false positive here. Solution: Disable poprelayd. CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N |
Querverweis: |
BugTraq ID: 2986 Common Vulnerability Exposure (CVE) ID: CVE-2001-1075 http://www.securityfocus.com/bid/2986 Bugtraq: 20010703 poprelayd and sendmail relay authentication problem (Cobalt Raq3) (Google Search) http://archives.neohapsis.com/archives/bugtraq/2001-07/0064.html Bugtraq: 20010709 Re: poprelayd and sendmail relay authentication problem (Cobalt Raq3) (Google Search) http://archives.neohapsis.com/archives/bugtraq/2001-07/0150.html XForce ISS Database: cobalt-poprelayd-mail-relay(6806) https://exchange.xforce.ibmcloud.com/vulnerabilities/6806 |
Copyright | Copyright (C) 2002 Michel Arboi |
Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |