GEN004660 - The SMTP service must not have the EXPN feature active.

Information

The SMTP EXPN function allows an attacker to determine if an account exists on a system, providing significant assistance to a brute force attack on user accounts. EXPN may also provide additional information concerning users on the system, such as the full names of account owners.

Solution

Rebuild /etc/mail/sendmail.cf with the 'noexpn' Privacy Flag set.

Procedure:
Edit /etc/mail/sendmail.mc resetting the Privacy Flags to the default:

define('confPRIVACYFLAGS', 'authwarnings,novrfy,noexpn,restrictqrun')dnl

Rebuild the sendmail.cf file with:
# make -C /etc/mail

Restart the sendmail service.
# service sendmail restart

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_5_V2R1_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|III, CCI|CCI-000366, Rule-ID|SV-218550r603259_rule, STIG-ID|GEN004660, STIG-Legacy|SV-62833, STIG-Legacy|V-4692, Vuln-ID|V-218550

Plugin: Unix

Control ID: 85e609a0b2a2a814dc8032123c52cffff88540dab8aefb0c94b8ec4ef836b9ff