How to Buy
This script is Copyright (C) 2000-2015 Tenable Network Security, Inc.
It might be possible to run arbitrary code on the remote server.
The remote pop3 server seems vulnerable to a buffer overflow when
issued a very long user name (10,000 chars)
This *may* allow an attacker to execute arbitrary commands
as root on the remote POP3 server.
Contact your vendor about this vulnerability and ask for a patch.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 10.0
Family: Gain a shell remotely
Nessus Plugin ID: 10206 ()
Bugtraq ID: 894
CVE ID: CVE-2000-0060
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.