Netscape Messenging Server User Account Enumeration

Medium Nessus Network Monitor Plugin ID 1788

Synopsis

The remote host may give an attacker information useful for future attacks.

Description

The remote POP server allows an attacker to obtain a list of valid logins on the remote host via a brute force attack. If the user connects to this port and issues the commands : USER 'someusername' PASS 'whatever' a different response will be generated if the account 'someusername' exists or not.

Solution

No solution is known at this time.

Plugin Details

Severity: Medium

ID: 1788

Family: POP Server

Published: 2004/08/20

Modified: 2018/09/16

Dependencies: 3035

Nessus ID: 10681

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 5

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:F/RL:U/RC:ND

CVSSv3

Base Score: 5.3

Temporal Score: 5.2

Vector: CVSS3#AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS3#E:F/RL:U/RC:X

Vulnerability Information

CPE: cpe:/a:netscape:messaging_server

Reference Information

CVE: CVE-2000-0960

BID: 1787