IMAP unencrypted cleartext logins 1.0
 
Plugin ID332
Plugin nameIMAP unencrypted cleartext logins
Plugin filenameIMAP unencrypted cleartext logins.plugin
Plugin filesize2192 bytes
Plugin familyMisc.
Plugin created nameMarc Ruef
Plugin created emailmarc.ruef at computec.ch
Plugin created webhttp://www.computec.ch
Plugin created companycomputec.ch
Plugin created date2005/01/09
Plugin version1.0
Plugin protocoltcp
Plugin port143
Plugin procedure detectionopen|sleep|send CAPABILITY\n|sleep|send QUIT\n|close|pattern_exists AUTH=LOGIN OR AUTH=PLAIN
Plugin detection accuracy75
Plugin commentThe NASL script is Copyright (C) 2004 George A. Theall
Bug vulnerability classMissing Encryption
Bug descriptionThe remote host is running an IMAP daemon that allows cleartext logins over unencrypted connections. An attacker can uncover user names and passwords by sniffing traffic to the IMAP daemon if a less secure authentication mechanism (eg, LOGIN command, AUTH=PLAIN, AUTH=LOGIN) is used.
Bug solutionContact your vendor for a fix or encrypt traffic with SSL / TLS using stunnel.
Bug fixing timeApprox. 30 minutes
Bug exploit availabilityYes
Bug remoteYes
Bug localYes
Bug severityLow
Bug popularity6
Bug simplicity8
Bug impact8
Bug risk7
Bug Nessus riskLow
Bug check toolsNessus can check this flaw with the plugin 15856 (IMAP Unencrypted Cleartext Logins).
Source OSVDB ID3119
Source Nessus ID15856
Source LiteratureHacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427
Source Misc.http://www.computec.ch

This file was generated by the Attack Tool Kit (ATK), the open-sourced security scanner and exploiting framework.