IMAP and POP are mail protocols that enable users to remotely access e-mail.
Since these protocols are designed and used for remotely accessing mail, holes
are frequently open in the firewall allowing IMAP and POP traffic to pass into
and out of the internal network. Because this access is open to the Internet,
hackers frequently target these protocols for attack. Many exploits are
available that enable hackers to gain root access to systems running IMAP and
POP protocols.
To defend against these exploits, system administrators should first remove IMAP and POP from the systems that do not need these services. Additionally, system administrators should ensure they are running the latest versions of the software and should monitor for and obtain all system patches.
To defend against these exploits, system administrators should first remove IMAP and POP from the systems that do not need these services. Additionally, system administrators should ensure they are running the latest versions of the software and should monitor for and obtain all system patches.
Comments
Post a Comment