Family: Misc. --> Category: infos
POP3 Unencrypted Cleartext Logins Vulnerability Scan
Vulnerability Scan Summary
Checks if POP3 daemon allows unencrypted cleartext logins
Detailed Explanation for this Vulnerability Test
The remote host is running a POP3 daemon that allows cleartext logins over
unencrypted connections. A possible hacker can uncover user names and
passwords by sniffing traffic to the POP3 daemon if a less secure
authentication mechanism (eg, USER command, AUTH PLAIN, AUTH LOGIN) is
Solution : Contact your vendor for a fix or encrypt traffic with SSL /
TLS using stunnel.
See also : RFC 2222 for infomation about SASL.
RFC 2595 for information about TLS with POP3.
Threat Level: Low
Click HERE for more information and discussions on this network vulnerability scan.