Vulnerability Name: | CVE-2008-5112 (CCN-46628) | ||||||||
Assigned: | 2008-11-13 | ||||||||
Published: | 2008-11-13 | ||||||||
Updated: | 2018-10-30 | ||||||||
Summary: | The LDAP server in Active Directory in Microsoft Windows 2000 SP4 and Server 2003 SP1 and SP2 responds differently to a failed bind attempt depending on whether the user account exists and is permitted to login, which allows remote attackers to enumerate valid usernames via a series of LDAP bind requests, as demonstrated by ldapuserenum. | ||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
| ||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N) 4.2 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:POC/RL:U/RC:UR)
4.2 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:POC/RL:U/RC:UR)
| ||||||||
Vulnerability Type: | CWE-200 | ||||||||
Vulnerability Consequences: | Obtain Information | ||||||||
References: | Source: MITRE Type: CNA CVE-2008-5112 Source: CCN Type: Portcullis Security Advisory, 13/11/2008 10:40:02 Microsoft Windows Active Directory LDAP Server Information Disclosure Vulnerability Source: MISC Type: UNKNOWN http://labs.portcullis.co.uk/application/ldapuserenum/ Source: CCN Type: Microsoft Web site Windows Server 2003 Active Directory Source: CCN Type: OSVDB ID: 50000 Microsoft Windows Active Directory LDAP Server Bind Request User Account Enumeration Source: CCN Type: Portcullis Security Advisory 08-010 Microsoft Windows Active Directory LDAP Server Source: MISC Type: UNKNOWN http://www.portcullis-security.com/294.php Source: BID Type: Exploit 32305 Source: CCN Type: BID-32305 Microsoft Active Directory LDAP Server Username Enumeration Weakness Source: XF Type: UNKNOWN activedirectory-username-info-disclosure(46628) Source: XF Type: UNKNOWN activedirectory-username-info-disclosure(46628) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |