4.3
CVSSv2

CVE-2012-2668

Published: 17/06/2012 Updated: 13/02/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

libraries/libldap/tls_m.c in OpenLDAP, possibly 2.4.31 and previous versions, when using the Mozilla NSS backend, always uses the default cipher suite even when TLSCipherSuite is set, which might cause OpenLDAP to use weaker ciphers than intended and make it easier for remote malicious users to obtain sensitive information.

Vulnerable Product Search on Vulmon Subscribe to Product

openldap openldap 2.4.17

openldap openldap 2.4.6

openldap openldap 2.4.11

openldap openldap 2.4.8

openldap openldap 2.4.26

openldap openldap 2.4.9

openldap openldap 2.4.16

openldap openldap

openldap openldap 2.4.29

openldap openldap 2.4.22

openldap openldap 2.4.25

openldap openldap 2.4.20

openldap openldap 2.4.15

openldap openldap 2.4.18

openldap openldap 2.4.27

openldap openldap 2.4.7

openldap openldap 2.4.28

openldap openldap 2.4.23

openldap openldap 2.4.24

openldap openldap 2.4.14

openldap openldap 2.4.19

openldap openldap 2.4.12

openldap openldap 2.4.21

openldap openldap 2.4.30

openldap openldap 2.4.13

openldap openldap 2.4.10

Vendor Advisories

Synopsis Low: openldap security and bug fix update Type/Severity Security Advisory: Low Topic Updated openldap packages that fix one security issue and one bug are nowavailable for Red Hat Enterprise Linux 6The Red Hat Security Response Team has rated this update as having lowsecurity impact A Common Vuln ...
It was found that the OpenLDAP server daemon ignored olcTLSCipherSuite settings This resulted in the default cipher suite always being used, which could lead to weaker than expected ciphers being accepted during Transport Layer Security (TLS) negotiation with OpenLDAP clients (CVE-2012-2668) ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> Full Disclosure mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> APPLE-SA-2019-12-10-3 macOS Catalina 10152, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra <! ...