Family: SMTP problems --> Category: attack
Debian GNU/Linux Sendmail Default SASL Password Vulnerability Scan
Vulnerability Scan Summary
Checks SMTP authentication
Detailed Explanation for this Vulnerability Test
The remote host is running a Sendmail server with a default SASL
password of 'sendmail' / 'sendmailpwd'.
A spammer may use this account to use the remote server as a spam relay
for the internet.
See also : http://www.debian.org/security/2004/dsa-554
Solution : Disable this account as soon as possible
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.