[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2005-2069Date: (C)2005-06-30   (M)2023-12-22


pam_ldap and nss_ldap, when used with OpenLDAP and connecting to a slave using TLS, does not use TLS for the subsequent connection if the client is referred to a master, which may cause a password to be sent in cleartext and allows remote attackers to sniff the password.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 5.0
Exploit Score: 10.0
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: NONE
Availability: NONE
  
Reference:
BID-14125
BID-14126
SECUNIA-17233
OSVDB-17692
SECUNIA-17845
http://archives.neohapsis.com/archives/fulldisclosure/2005-07/0060.html
SECUNIA-21520
GLSA-2005-07-13
MDKSA-2005:121
RHSA-2005:751
RHSA-2005:767
USN-152-1
http://bugs.gentoo.org/show_bug.cgi?id=96767
http://bugzilla.padl.com/show_bug.cgi?id=210
http://bugzilla.padl.com/show_bug.cgi?id=211
http://support.avaya.com/elmodocs2/security/ASA-2006-157.htm
http://www.openldap.org/its/index.cgi/Incoming?id=3791
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=161990
ldap-tls-information-disclosure(21245)
oval:org.mitre.oval:def:9445

CPE    1
cpe:/a:openldap:openldap
CWE    1
CWE-319

© SecPod Technologies