7.5
CVSSv2

CVE-2006-5170

Published: 10/10/2006 Updated: 25/02/2022
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

pam_ldap in nss_ldap on Red Hat Enterprise Linux 4, Fedora Core 3 and previous versions, and possibly other distributions does not return an error condition when an LDAP directory server responds with a PasswordPolicyResponse control response, which causes the pam_authenticate function to return a success code even if authentication has failed, as originally reported for xscreensaver.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

redhat enterprise linux 4.0

fedoraproject fedora core

redhat enterprise linux desktop 4.0

redhat enterprise linux for ibm z systems 4.0_s390

redhat enterprise linux for ibm z systems 4.0_s390x

redhat enterprise linux for power big endian 4.0

redhat enterprise linux server 4.0

redhat enterprise linux workstation 4.0

debian debian linux 3.1

Vendor Advisories

Debian Bug report logs - #392984 CVE-2006-5170: pam_ldap authentication bypass Package: libpam-ldap; Maintainer for libpam-ldap is Lucas de Castro Borges <lucas@gnuabordocombr>; Source for libpam-ldap is src:libpam-ldap (PTS, buildd, popcon) Reported by: Stefan Fritsch <sf@sfritschde> Date: Sat, 14 Oct 2006 14:48: ...