First published: Wed Nov 16 2005(Updated: )
slapd daemon in IBM Tivoli Directory Server (ITDS) 5.2.0 and 6.0.0 binds using SASL EXTERNAL, which allows attackers to bypass authentication and modify and delete directory data via unknown attack vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Tivoli Directory Server | =5.2.0 | |
IBM Tivoli Directory Server | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3567 has a critical severity rating due to its potential to allow unauthorized modifications and deletions of directory data.
To fix CVE-2005-3567, upgrade IBM Tivoli Directory Server to a patched version that mitigates this vulnerability.
CVE-2005-3567 affects IBM Tivoli Directory Server versions 5.2.0 and 6.0.0.
CVE-2005-3567 allows attackers to bypass authentication, leading to unauthorized access and potential data compromise.
Organizations using IBM Tivoli Directory Server versions 5.2.0 and 6.0.0 are at risk from CVE-2005-3567.