Nmap Development mailing list archives

Re: [NSE] Check for CVE-2011-1720 - Postfix SMTP Cyrus SASL memory corruption


From: Djalal Harouni <tixxdz () opendz org>
Date: Thu, 19 May 2011 19:48:03 +0100

On 2011-05-17 17:26:16 +0100, Djalal Harouni wrote:
On 2011-05-16 19:17:41 -0700, Fyodor wrote:
If you don't have more vulns in mind for this script, maybe it would
be best to name it after the Postfix Cyrus SASL vulnerability it
detects.  Then if we find a later SMTP vulnerability and we believe it
makes sense to combine detection into one script, we could do so then?
Or if we decide they would be best structured as different scripts
(from a user interface perspective), we could move the shared code to
a library.
There are the exim vulnerabilities (one of them is too old).

If we decide to change the name, what do you think about:
smtp-cve-2011-1720.nse
smtp-postfix-cve-2011-1720.nse
The script was renamed to smtp-vuln-cve2011-1720.nse

This was suggested and approved by Fyodor and David, thx.

-- 
tixxdz
http://opendz.org
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: