Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2005-2069

Опубликовано: 30 июн. 2005
Источник: debian
EPSS Низкий

Описание

pam_ldap and nss_ldap, when used with OpenLDAP and connecting to a slave using TLS, does not use TLS for the subsequent connection if the client is referred to a master, which may cause a password to be sent in cleartext and allows remote attackers to sniff the password.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
openldap2.2fixed2.2.26-3package
openldap2fixed2.1.30-11package
libpam-ldapfixed178-1sarge1package
libnss-ldapfixed238-1.1package

EPSS

Процентиль: 86%
0.02839
Низкий

Связанные уязвимости

ubuntu
почти 20 лет назад

pam_ldap and nss_ldap, when used with OpenLDAP and connecting to a slave using TLS, does not use TLS for the subsequent connection if the client is referred to a master, which may cause a password to be sent in cleartext and allows remote attackers to sniff the password.

redhat
почти 20 лет назад

pam_ldap and nss_ldap, when used with OpenLDAP and connecting to a slave using TLS, does not use TLS for the subsequent connection if the client is referred to a master, which may cause a password to be sent in cleartext and allows remote attackers to sniff the password.

nvd
почти 20 лет назад

pam_ldap and nss_ldap, when used with OpenLDAP and connecting to a slave using TLS, does not use TLS for the subsequent connection if the client is referred to a master, which may cause a password to be sent in cleartext and allows remote attackers to sniff the password.

msrc
больше 4 лет назад

Описание отсутствует

github
около 3 лет назад

pam_ldap and nss_ldap, when used with OpenLDAP and connecting to a slave using TLS, does not use TLS for the subsequent connection if the client is referred to a master, which may cause a password to be sent in cleartext and allows remote attackers to sniff the password.

EPSS

Процентиль: 86%
0.02839
Низкий