Home page logo
/

nmap-dev logo Nmap Development mailing list archives

Re: [NSE] Check for CVE-2011-1720 - Postfix SMTP Cyrus SASL memory corruption
From: Djalal Harouni <tixxdz () opendz org>
Date: Sun, 15 May 2011 17:12:54 +0100

On 2011-05-15 16:29:29 +0200, Henri Doreau wrote:
2011/5/14 Martin Holst Swende <martin () swende se>:
Hi,
Did a quick test against a server which appears not to be vulnerable. I
have just one minor correction; in the usage-field, you have written "

nmap --script smtp-check-vuln.nse [--script-args smtp.domain=<domain>] -pT:25,465,587 <host>
"

i.e. "smtp-check-vuln.nse" but the script name is "smtp-check-vulns.nse" (plural 's'). Very minor, but annoying 
when a user does copy-paste from the usage-field. So, either change the script name or the docs.
Regards,
Martin Holst Swende
Thank you Martin, I've corrected this.

I've also added an extra output message to show which authentication
mechanisms the script has tested.

Djalal can you fix this and commit? As I told you the script looks very good.
This was committed as svn r23165.

That will be our 200th NSE script! :)
Congratulations to Nmap and to all the developers and contributors :)

Thx.

-- 
tixxdz
http://opendz.org
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault