CVE-2005-2069
Gentoo Linux Security Advisory 200507-13
Severity Score
9.1
*CVSS v3
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
pam_ldap and nss_ldap, when used with OpenLDAP and connecting to a slave using TLS, does not use TLS for the subsequent connection if the client is referred to a master, which may cause a password to be sent in cleartext and allows remote attackers to sniff the password.
Andrea Barisani discovered a flaw in the SSL handling of pam-ldap and libnss-ldap. When a client connected to a slave LDAP server using SSL, the slave server did not use SSL as well when contacting the LDAP master server. This caused passwords and other confident information to be transmitted unencrypted between the slave and the master.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2005-06-29 CVE Reserved
- 2005-06-29 CVE Published
- 2024-08-07 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-319: Cleartext Transmission of Sensitive Information
CAPEC
References (22)
URL | Tag | Source |
---|---|---|
http://archives.neohapsis.com/archives/fulldisclosure/2005-07/0060.html | Broken Link | |
http://bugs.gentoo.org/show_bug.cgi?id=96767 | Third Party Advisory | |
http://secunia.com/advisories/17233 | Third Party Advisory | |
http://secunia.com/advisories/17845 | Third Party Advisory | |
http://secunia.com/advisories/21520 | Third Party Advisory | |
http://support.avaya.com/elmodocs2/security/ASA-2006-157.htm | Third Party Advisory | |
http://www.osvdb.org/17692 | Broken Link | |
http://www.securityfocus.com/bid/14125 | Third Party Advisory | |
http://www.securityfocus.com/bid/14126 | Third Party Advisory | |
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=161990 | Issue Tracking | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/21245 | Third Party Advisory | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9445 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://bugzilla.padl.com/show_bug.cgi?id=210 | 2020-11-16 | |
http://www.openldap.org/its/index.cgi/Incoming?id=3791 | 2020-11-16 |
URL | Date | SRC |
---|---|---|
http://bugzilla.padl.com/show_bug.cgi?id=211 | 2020-11-16 | |
http://www.gentoo.org/security/en/glsa/glsa-200507-13.xml | 2020-11-16 | |
http://www.redhat.com/support/errata/RHSA-2005-751.html | 2020-11-16 | |
http://www.redhat.com/support/errata/RHSA-2005-767.html | 2020-11-16 | |
http://www.ubuntu.com/usn/usn-152-1 | 2020-11-16 | |
http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:121 | 2020-11-16 | |
https://access.redhat.com/security/cve/CVE-2005-2069 | 2005-10-17 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1617681 | 2005-10-17 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Padl Search vendor "Padl" | Nss Ldap Search vendor "Padl" for product "Nss Ldap" | - | - |
Affected
| in | Openldap Search vendor "Openldap" | Openldap Search vendor "Openldap" for product "Openldap" | * | - |
Safe
|
Padl Search vendor "Padl" | Pam Ldap Search vendor "Padl" for product "Pam Ldap" | - | - |
Affected
| in | Openldap Search vendor "Openldap" | Openldap Search vendor "Openldap" for product "Openldap" | * | - |
Safe
|