Netscape Messenging Server User Account Enumeration

Medium Nessus Network Monitor Plugin ID 1788


The remote host may give an attacker information useful for future attacks.


The remote POP server allows an attacker to obtain a list of valid logins on the remote host via a brute force attack. If the user connects to this port and issues the commands : USER 'someusername' PASS 'whatever' a different response will be generated if the account 'someusername' exists or not.


No solution is known at this time.

Plugin Details

Severity: Medium

ID: 1788

Family: POP Server

Published: 2004/08/20

Updated: 2019/03/06

Dependencies: 3035

Nessus ID: 10681

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:F/RL:U/RC:ND

CVSS v3.0

Base Score: 5.3

Temporal Score: 5.2

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:F/RL:U/RC:X

Vulnerability Information

CPE: cpe:/a:netscape:messaging_server

Reference Information

CVE: CVE-2000-0960

BID: 1787