Detecting vulnerable Exim SMTP servers version 4.70 through 4.75
Exim SMTP servers 4.70 through 4.75 with DKIM enabled are vulnerable to a format string bug that allows remote attackers to execute code. Nmap NSE can help penetration testers to detect this vulnerability remotely.
This recipe illustrates the process of exploiting an Exim SMTP server with Nmap.
How to do it...
Open your terminal and type the following command:
$ nmap --script smtp-vuln-cve2011-1764 --script-args mailfrom=<Source address>,mailto=<Destination address>,domain=<domain> -p25,465,587 <target>
If the Exim server is vulnerable, more information will be included in the script output section:
PORT STATE SERVICE 587/tcp open submission | smtp-vuln-cve2011-1764: | VULNERABLE: | Exim DKIM format string | State: VULNERABLE | IDs: CVE:CVE-2011-1764 OSVDB:72156 | Risk factor: High CVSSv2: 7.5 (HIGH) (AV:N/AC:L/Au:N/C:P/I:P/A:P) | Description: | Exim SMTP server (version...