Bug 162794 - CAN-2005-2069 PADL Software PAM_LDAP TLS Plaintext Password
CAN-2005-2069 PADL Software PAM_LDAP TLS Plaintext Password
Status: CLOSED WONTFIX
Product: Fedora Legacy
Classification: Retired
Component: nss_ldap (Show other bugs)
rhl7.3
i386 Linux
medium Severity medium
: ---
: ---
Assigned To: Fedora Legacy Bugs
http://www.securityfocus.com/bid/14126
:
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2005-07-08 14:08 EDT by John Dalbec
Modified: 2007-08-30 16:04 EDT (History)
0 users

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2007-08-30 16:04:14 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description John Dalbec 2005-07-08 14:08:33 EDT
From Bugzilla Helper:
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.2) Gecko/20040804 Netscape/7.2 (ax)

Description of problem:
05.27.8 CVE: CAN-2005-2069
Platform: Linux
Title: PADL Software PAM_LDAP TLS Plaintext Password
Description: PAM_LDAP is the PAM module package designed to allow
authentication with LDAP servers via PAM-compliant authentication
mechanisms. It is reported to be vulnerable to a potential password
disclosure issue when used with TLS. The issue presents itself when
LDAP client connects to the master which was redirected by LDAP slave,
by using the same credentials but without TLS.
Ref: http://www.securityfocus.com/bid/14126 

Version-Release number of selected component (if applicable):


How reproducible:
Didn't try


Additional info:
Comment 1 John Dalbec 2005-09-20 09:48:37 EDT
05.34.7 CVE: CAN-2005-2641
Platform: Unix
Title: PADL Software PAM_LDAP Authentication Bypass
Description: PAM_LDAP is the PAM module package designed to allow
authentication with LDAP servers via PAM-compliant authentication
mechanisms. PAM_LDAP is prone to an authentication bypass
vulnerability. When handling new password policy control, if the LDAP
server returns a passwordPolicyResponse control in a BindResponse
without the optional "error" field, PAM_LDAP will not fall through to
the account management module. Successful exploitation could allow an
unauthorized user to bypass authentication.
Ref: http://www.securityfocus.com/bid/14649 
Comment 2 Jesse Keating 2007-08-30 16:04:14 EDT
Fedora Legacy project has ended.  These will not be fixed by Fedora Legacy.

Note You need to log in before you can comment on or make changes to this bug.