pam_ldap and nss_ldap, when used with OpenLDAP and connecting to a slave using TLS, does not use TLS for the subsequent connection if the client is referred to a master, which may cause a password to be sent in cleartext and allows remote attackers to sniff the password.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2005-2071 | pam_ldap and nss_ldap, when used with OpenLDAP and connecting to a slave using TLS, does not use TLS for the subsequent connection if the client is referred to a master, which may cause a password to be sent in cleartext and allows remote attackers to sniff the password. |
Ubuntu USN |
USN-152-1 | PAM/NSS LDAP vulnerabilitiy |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T22:15:37.352Z
Reserved: 2005-06-29T00:00:00
Link: CVE-2005-2069
No data.
Status : Deferred
Published: 2005-06-30T04:00:00.000
Modified: 2025-04-03T01:03:51.193
Link: CVE-2005-2069
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN