Hello Jim,

> doesn't this exploit require that they can login under telnet (or SSH). So
> first they have to obtain a valid shell userid and password ?

No.

You're confusing TELNET to port 23. In the exploit explanation, this is
TELNET to port 25 which is your SMTP server. If your SMTP server is running
_anyone_ can TELNET to port 25 on your server and get the SMTP prompt.

Try it yourself from your PC client:

telnet my.server.com 25

You'll get a reply back, something like:
220 my.server.com ESMTP Sendmail 8.9.3/8.9.3; Wed, 4 Jul 2001 22:33:11 +0100

It's then waiting for you to enter the exploit. To quite out of the above
enter the command:
quit

Regards,
Jonathan Michaelson
Commercial Perl CGI Scripting

_______________________________________________
cobalt-security mailing list
[EMAIL PROTECTED]
http://list.cobalt.com/mailman/listinfo/cobalt-security

Reply via email to