Vulnerability Name: | CVE-2005-2069 (CCN-21245) | ||||||||||||||||||||||||
Assigned: | 2005-06-28 | ||||||||||||||||||||||||
Published: | 2005-06-28 | ||||||||||||||||||||||||
Updated: | 2020-11-16 | ||||||||||||||||||||||||
Summary: | pam_ldap and nss_ldap, when used with OpenLDAP and connecting to a slave using TLS, does not use TLS for the subsequent connection if the client is referred to a master, which may cause a password to be sent in cleartext and allows remote attackers to sniff the password. | ||||||||||||||||||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
| ||||||||||||||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N) 3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||
Vulnerability Type: | CWE-319 | ||||||||||||||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||||||||||||||
References: | Source: CCN Type: BugTraq Mailing List, Mon Jul 04 2005 - 14:06:15 CDT pam_ldap/nss_ldap password leak in a master+slave+start_tls LDAP setup Source: FULLDISC Type: Broken Link 20050704 pam_ldap/nss_ldap password leak in a master+slave+start_tls LDAP setup Source: CCN Type: Full-disclosure Mailing List, Thu Jul 21 2005 - 09:12:21 CDT PAM/NSS LDAP vulnerabilitiy Source: CONFIRM Type: Third Party Advisory http://bugs.gentoo.org/show_bug.cgi?id=96767 Source: MISC Type: Issue Tracking, Patch, Vendor Advisory http://bugzilla.padl.com/show_bug.cgi?id=210 Source: MISC Type: Issue Tracking, Vendor Advisory http://bugzilla.padl.com/show_bug.cgi?id=211 Source: MITRE Type: CNA CVE-2005-2069 Source: CCN Type: RHSA-2005-751 openldap and nss_ldap security update Source: CCN Type: RHSA-2005-767 openldap and nss_ldap security update Source: SECUNIA Type: Third Party Advisory 17233 Source: SECUNIA Type: Third Party Advisory 17845 Source: CCN Type: SA21520 Avaya Products Multiple Vulnerabilities Source: SECUNIA Type: Third Party Advisory 21520 Source: CONFIRM Type: Third Party Advisory http://support.avaya.com/elmodocs2/security/ASA-2006-157.htm Source: CCN Type: ASA-2006-157 openldap and nss_ldap security update Source: DEBIAN Type: DSA-785 libpam-ldap -- authentication bypass Source: CCN Type: Internet FAQ Archives Web site RFC 1777 (rfc1777) - Lightweight Directory Access Protocol Source: CCN Type: GLSA-200507-13 pam_ldap and nss_ldap: Plain text authentication leak Source: GENTOO Type: Third Party Advisory GLSA-2005-07-13 Source: MISC Type: Patch, Vendor Advisory http://www.openldap.org/its/index.cgi/Incoming?id=3791 Source: OSVDB Type: Broken Link 17692 Source: CCN Type: OSVDB ID: 17692 OpenLDAP / pam_ldap TLS Connection Cleartext Password Disclosure Source: REDHAT Type: Third Party Advisory RHSA-2005:751 Source: REDHAT Type: Third Party Advisory RHSA-2005:767 Source: BID Type: Third Party Advisory, VDB Entry 14125 Source: CCN Type: BID-14125 OpenLDAP TLS Plaintext Password Vulnerability Source: BID Type: Third Party Advisory, VDB Entry 14126 Source: CCN Type: BID-14126 PADL Software PAM_LDAP TLS Plaintext Password Vulnerability Source: CCN Type: TLSA-2005-86 Password leak Source: CCN Type: TLSA-2005-87 Password leak Source: CCN Type: USN-152-1 PAM/NSS LDAP vulnerabilitiy Source: UBUNTU Type: Third Party Advisory USN-152-1 Source: MANDRIVA Type: Third Party Advisory MDKSA-2005:121 Source: CONFIRM Type: Issue Tracking, Third Party Advisory https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=161990 Source: XF Type: Third Party Advisory, VDB Entry ldap-tls-information-disclosure(21245) Source: XF Type: UNKNOWN ldap-tls-information-disclosure(21245) Source: OVAL Type: Third Party Advisory oval:org.mitre.oval:def:9445 Source: SUSE Type: SUSE-SR:2005:020 SUSE Security Summary Report | ||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: ![]() | ||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||
| |||||||||||||||||||||||||
BACK |