5
CVSSv2

CVE-2005-2069

Published: 30/06/2005 Updated: 16/11/2020
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

pam_ldap and nss_ldap, when used with OpenLDAP and connecting to a slave using TLS, does not use TLS for the subsequent connection if the client is referred to a master, which may cause a password to be sent in cleartext and allows remote malicious users to sniff the password.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

padl nss_ldap -

padl pam_ldap -

Vendor Advisories

Andrea Barisani discovered a flaw in the SSL handling of pam-ldap and libnss-ldap When a client connected to a slave LDAP server using SSL, the slave server did not use SSL as well when contacting the LDAP master server This caused passwords and other confident information to be transmitted unencrypted between the slave and the master ...
Synopsis openldap and nss_ldap security update Type/Severity Security Advisory: Moderate Topic Updated openldap and nss_ldap packages that correct a potential password disclosure issue and possible authentication vulnerability are now available This update has been rated as having moderate security impact ...
Synopsis openldap and nss_ldap security update Type/Severity Security Advisory: Moderate Topic Updated openldap and nss_ldap packages that correct a potential password disclosure issue are now availableThis update has been rated as having moderate security impact by the Red Hat Security Response Team ...