Netscape Messenging Server User Account Enumeration

medium Nessus Network Monitor Plugin ID 1788

Synopsis

The remote host may give an attacker information useful for future attacks.

Description

The remote POP server allows an attacker to obtain a list of valid logins on the remote host via a brute force attack. If the user connects to this port and issues the commands : USER 'someusername' PASS 'whatever' a different response will be generated if the account 'someusername' exists or not.

Solution

No solution is known at this time.

Plugin Details

Severity: Medium

ID: 1788

Family: POP Server

Published: 8/20/2004

Updated: 3/6/2019

Nessus ID: 10681

Risk Information

VPR

Risk Factor: Medium

Score: 6.1

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 5.2

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:F/RL:U/RC:X

Vulnerability Information

CPE: cpe:/a:netscape:messaging_server

Reference Information

CVE: CVE-2000-0960

BID: 1787