Lucene search

K
nessusThis script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.AIX_IJ50433.NASL
HistoryMay 10, 2024 - 12:00 a.m.

AIX 7.3 TL 0 : sendmail (IJ50433)

2024-05-1000:00:00
This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
6
aix 7.3
sendmail
vulnerability

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

7 High

AI Score

Confidence

Low

0.002 Low

EPSS

Percentile

54.7%

https://vulners.com/cve/CVE-2023-51765 Proofpoint sendmail is vulnerable to SMTP smuggling, caused by improper handling of line endings . in an email message. By sending a specially crafted request using SMTP MAIL/RCPT/DATA commands, an attacker could exploit this vulnerability to spoof an email message from any MAIL FROM address.

#%NASL_MIN_LEVEL 80900
#
# (C) Tenable Network Security, Inc.
#
# The text in the description was extracted from AIX Security
# Advisory sendmail_advisory4.asc.
#

include("compat.inc");

if (description)
{
  script_id(195314);
  script_version("1.0");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/05/10");

  script_cve_id("CVE-2023-51765");

  script_name(english:"AIX 7.3 TL 0 : sendmail (IJ50433)");
  script_summary(english:"Check for APAR IJ50433");

  script_set_attribute(
    attribute:"synopsis",
    value:"The remote AIX host is missing a security patch."
  );
  script_set_attribute(
    attribute:"description",
    value:
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51765
Proofpoint sendmail is vulnerable to SMTP smuggling, caused by
improper handling of line endings . in an email message. By sending a
specially crafted request using SMTP MAIL/RCPT/DATA commands, an
attacker could exploit this vulnerability to spoof an email message
from any MAIL FROM address."
  );
  # https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory4.asc
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.nessus.org/u?30e4cb3b"
  );
  script_set_attribute(
    attribute:"solution",
    value:"Install the appropriate interim fix."
  );
  script_set_attribute(attribute:"risk_factor", value:"High");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:ibm:aix:7.3");

  script_set_attribute(attribute:"vuln_publication_date", value:"2024/04/11");
  script_set_attribute(attribute:"patch_publication_date", value:"2024/04/11");
  script_set_attribute(attribute:"plugin_publication_date", value:"2024/05/10");
  script_set_attribute(attribute:"generated_plugin", value:"current");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_family(english:"AIX Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/AIX/lslpp", "Host/local_checks_enabled", "Host/AIX/version");

  exit(0);
}



include("audit.inc");
include("global_settings.inc");
include("aix.inc");
include("misc_func.inc");

if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if ( ! get_kb_item("Host/AIX/version") ) audit(AUDIT_OS_NOT, "AIX");
if ( ! get_kb_item("Host/AIX/lslpp") ) audit(AUDIT_PACKAGE_LIST_MISSING);

if ( get_kb_item("Host/AIX/emgr_failure" ) ) exit(0, "This iFix check is disabled because : "+get_kb_item("Host/AIX/emgr_failure") );

flag = 0;

if (aix_check_ifix(release:"7.3", ml:"00", sp:"02", patch:"IJ50433s4a", package:"bos.net.tcp.sendmail", minfilesetver:"7.3.0.0", maxfilesetver:"7.3.0.0") < 0) flag++;
if (aix_check_ifix(release:"7.3", ml:"00", sp:"03", patch:"IJ50433s4a", package:"bos.net.tcp.sendmail", minfilesetver:"7.3.0.0", maxfilesetver:"7.3.0.0") < 0) flag++;
if (aix_check_ifix(release:"7.3", ml:"00", sp:"04", patch:"IJ50433s4a", package:"bos.net.tcp.sendmail", minfilesetver:"7.3.0.0", maxfilesetver:"7.3.0.0") < 0) flag++;

if (flag)
{
  if (report_verbosity > 0) security_hole(port:0, extra:aix_report_get());
  else security_hole(0);
  exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
VendorProductVersionCPE
ibmaix7.3cpe:/o:ibm:aix:7.3

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

7 High

AI Score

Confidence

Low

0.002 Low

EPSS

Percentile

54.7%