Bug 162792 - CAN-2005-2069 OpenLDAP TLS Plaintext Password Vulnerability
Summary: CAN-2005-2069 OpenLDAP TLS Plaintext Password Vulnerability
Keywords:
Status: CLOSED WONTFIX
Alias: None
Product: Fedora Legacy
Classification: Retired
Component: openldap
Version: rhl7.3
Hardware: i386
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Fedora Legacy Bugs
QA Contact:
URL: http://www.securityfocus.com/advisori...
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2005-07-08 18:04 UTC by John Dalbec
Modified: 2007-08-30 19:57 UTC (History)
0 users

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2007-08-30 19:57:17 UTC
Embargoed:


Attachments (Terms of Use)

Description John Dalbec 2005-07-08 18:04:48 UTC
From Bugzilla Helper:
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.2) Gecko/20040804 Netscape/7.2 (ax)

Description of problem:
05.27.16 CVE: CAN-2005-2069
Platform: Cross Platform
Title: OpenLDAP TLS Plaintext Password Vulnerability
Description: OpenLDAP is a LDAP protocol implementation. It is
vulnerable to a password disclosure issue when used with TLS. An
attacker could sniff network traffic to obtain user credentials.
OpenLDAP version 2.1.25 is vulnerable.
Ref: http://www.securityfocus.com/advisories/8783 

Version-Release number of selected component (if applicable):


How reproducible:
Didn't try


Additional info:

Comment 1 Jesse Keating 2007-08-30 19:57:17 UTC
Fedora Legacy project has ended.  These will not be fixed by Fedora Legacy.


Note You need to log in before you can comment on or make changes to this bug.