First published: Wed Jun 29 2005(Updated: )
pam_ldap and nss_ldap, when used with OpenLDAP and connecting to a slave using TLS, does not use TLS for the subsequent connection if the client is referred to a master, which may cause a password to be sent in cleartext and allows remote attackers to sniff the password.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
PADL nss_ldap | ||
PADL PAM LDAP | ||
OpenLDAP |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2069 is categorized as a medium-severity vulnerability due to the possibility of password exposure.
To fix CVE-2005-2069, ensure that your application is configured to use TLS for all connections, including those to a master server.
CVE-2005-2069 affects PADL's pam_ldap and nss_ldap libraries when used with OpenLDAP.
Yes, CVE-2005-2069 can lead to data breaches as it allows passwords to be transmitted in cleartext.
If exploited, CVE-2005-2069 allows remote attackers to sniff user passwords during the connection process.