First published: Wed Oct 04 2006(Updated: )
pam_ldap in nss_ldap on Red Hat Enterprise Linux 4, Fedora Core 3 and earlier, and possibly other distributions does not return an error condition when an LDAP directory server responds with a PasswordPolicyResponse control response, which causes the pam_authenticate function to return a success code even if authentication has failed, as originally reported for xscreensaver.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux | =4.0 | |
Fedora Core | <=core_3.0 | |
Red Hat Enterprise Linux | =4.0 | |
redhat enterprise Linux desktop | =4.0 | |
redhat enterprise Linux server | =4.0 | |
redhat enterprise Linux workstation | =4.0 | |
redhat enterprise Linux for ibm z systems | =4.0_s390x | |
redhat enterprise Linux for ibm z systems | =4.0_s390 | |
redhat enterprise Linux for power big endian | =4.0 | |
Debian | =3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-5170 has been classified as a high severity vulnerability due to its potential impact on authentication processes.
To fix CVE-2006-5170, users should upgrade to a version of pam_ldap that properly handles PasswordPolicyResponse control responses.
CVE-2006-5170 affects Red Hat Enterprise Linux 4, Fedora Core 3 and earlier, and possibly other distributions using vulnerable versions of pam_ldap.
CVE-2006-5170 is an authentication vulnerability that allows pam_authenticate to incorrectly return a success code.
Yes, CVE-2006-5170 affects how pam_ldap interacts with LDAP directory services, leading to potential unauthorized access.