Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 161990 - openldap password disclosure issue
openldap password disclosure issue
Product: Red Hat Enterprise Linux 4
Classification: Red Hat
Component: openldap (Show other bugs)
All Linux
medium Severity medium
: ---
: ---
Assigned To: Jan Safranek
Jay Turner
: Security
Depends On:
  Show dependency treegraph
Reported: 2005-06-28 17:42 EDT by Josh Bressers
Modified: 2015-01-07 19:10 EST (History)
3 users (show)

See Also:
Fixed In Version: openldap-2.2.13-4
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2007-07-19 07:05:24 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Josh Bressers 2005-06-28 17:42:19 EDT
Openldap currently doesn't allow a client to specify that referred
connections should use TLS. This can lead to passwords being sent in the
clear despite having "ssl start_tls" in ldap.conf.

In a master+slaves LDAP infrastructure passwords are sent in the clear
when a user runs "passwd" on a machine where pam_ldap is configured to
use a slave server.

pam_ldap connects to the slave over TLS (as specified in the ldap.conf
file) and then gets referred to the master in order to make a change.
TLS is never started on the referred connection and pam_ldap attempts to
bind in the clear. If the master server is not setup to require TLS on
all connections, this may go unoticed, as passwd will function as

The only place a client is able to try and start_tls for a referred
connection is inside rebind_proc. However, a bug in a sanity check in
the openldap code means that openldap considers that TLS has already
been started on the referrred connection if it has been started on the
first connection (it always checks the first connection, rather than
checking the default), and so this won't work.

Bugs have been filed on both openldap and pam_ldap:


Comment 1 Josh Bressers 2005-06-28 17:43:25 EDT
This issue may also affect RHEL2.1 and RHEL3
Comment 2 Rob Holland 2005-07-04 16:34:33 EDT
It would have been nice if you'd mentioned my name after you copy+pasted my
advisory into this bug.

You're advisory is missing the nss_ldap package which is also affected.


You may also see that URL listed in my posting to full-disclosure or bugtraq, if
you'd prefer to copy+paste it from another of my reports.

Comment 3 Rob Holland 2005-07-04 17:01:36 EDT
Oh, and the original bug is at:

Comment 4 John Haxby 2005-10-17 06:37:22 EDT
Why does _rebind_proc() in pam_ldap return PAM_SERVICE_ERR?   Surely it should
be returning an LDAP error code?
Comment 5 RHEL Product and Program Management 2007-06-08 07:44:28 EDT
This request was evaluated by Red Hat Product Management for inclusion in a Red
Hat Enterprise Linux maintenance release.  Product Management has requested
further review of this request by Red Hat Engineering, for potential
inclusion in a Red Hat Enterprise Linux Update release for currently deployed
products.  This request is not yet committed for inclusion in an Update
Comment 8 Jan Safranek 2007-07-19 07:05:24 EDT
This bug was fixed long ago in openldap-2.2.13-4.

Note You need to log in before you can comment on or make changes to this bug.