GEN004660 - The SMTP service must not have the EXPN feature active.

Information

The SMTP EXPN function allows an attacker to determine if an account exists on a system, providing significant assistance to a brute-force attack on user accounts. EXPN may also provide additional information concerning users on the system, such as the full names of account owners.

False Positives:
False positives may occur with the SMTP EXPN check. According to RFC821, it is acceptable for a server to respond with a 250 (success) or 550 (failure) when the server supports the EXPN command. For example, some servers return '550 EXPN command not available', meaning the command is not supported and the machine is not vulnerable. However, a result of '550 That is a mailing list, not a user' would be a failure code, but not an indication of an error, and the machine would be vulnerable. If false positive is suspected, check the log file for the response from the server.

Solution

Edit the sendmail.cf file and add Opnoexpn option.
Restart the Sendmail service.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_10_SPARC_V2R4_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|III, CCI|CCI-000366, Rule-ID|SV-226941r603265_rule, STIG-ID|GEN004660, STIG-Legacy|SV-4692, STIG-Legacy|V-4692, Vuln-ID|V-226941

Plugin: Unix

Control ID: b7299f962b83d4d8f5da5d54f429bf368196a4ea82ff58cd7bcfc96d19f185ea