Rule ID
SV-45872r1_rule
Version
V1R12
CCIs
The SMTP EXPN function allows an attacker to determine if an account exists on a system, providing significant assistance to a brute force attack on user accounts. EXPN may also provide additional information concerning users on the system, such as the full names of account owners.
This vulnerability is applicable only to sendmail. If Postfix is the SMTP service for the system this will never be a finding. Procedure: Determine if EXPN is disabled. # grep -v "^#" /etc/mail/sendmail.cf |grep -i PrivacyOptions If nothing is returned or the returned line does not contain "noexpn", this is a finding.
Rebuild /etc/mail/sendmail.cf with the "noexpn" Privacy Flag set.
Procedure:
Edit /etc/mail/sendmail.mc resetting the Privacy Flags to the default:
define('confPRIVACYFLAGS', 'authwarnings,novrfy,noexpn,restrictqrun')dnl
Rebuild the sendmail.cf file with:
# make -C /etc/mail
Restart the sendmail service.
# service sendmail restart