Plugin ID | 331 |
Plugin name | POP2 unencrypted cleartext logins |
Plugin filename | POP2 unencrypted cleartext logins.plugin |
Plugin filesize | 2050 bytes |
Plugin family | SMTP |
Plugin created name | Marc Ruef |
Plugin created email | marc.ruef at computec.ch |
Plugin created web | http://www.computec.ch |
Plugin created company | computec.ch |
Plugin created date | 2005/01/09 |
Plugin version | 1.0 |
Plugin protocol | tcp |
Plugin port | 109 |
Plugin procedure detection | open|sleep|close|pattern_not_exists POP |
Plugin detection accuracy | 70 |
Plugin comment | The NASL script is Copyright (C) 2004 George A. Theall |
Bug affected | POP2 servers |
Bug vulnerability class | Missing Encryption |
Bug description | The remote host is running a POP2 daemon that allows cleartext logins over unencrypted connections. An attacker can uncover login names and passwords by sniffing traffic to the POP2 daemon. |
Bug solution | Encrypt traffic with SSL / TLS using stunnel. |
Bug fixing time | Approx. 1 hour |
Bug exploit availability | Yes |
Bug remote | Yes |
Bug local | Yes |
Bug severity | Low |
Bug popularity | 3 |
Bug simplicity | 8 |
Bug impact | 8 |
Bug risk | 6 |
Bug Nessus risk | Low |
Bug check tools | Nessus can check this flaw with the plugin 15854 (POP2 Unencrypted Cleartext Logins). |
Source OSVDB ID | 3119 |
Source Nessus ID | 15854 |
Source Literature | Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427 |
Source Misc. | http://www.computec.ch |