Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fv7v-76vm-38q4

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

pam_ldap and nss_ldap, when used with OpenLDAP and connecting to a slave using TLS, does not use TLS for the subsequent connection if the client is referred to a master, which may cause a password to be sent in cleartext and allows remote attackers to sniff the password.

pam_ldap and nss_ldap, when used with OpenLDAP and connecting to a slave using TLS, does not use TLS for the subsequent connection if the client is referred to a master, which may cause a password to be sent in cleartext and allows remote attackers to sniff the password.

EPSS

Процентиль: 86%
0.02839
Низкий

Дефекты

CWE-319

Связанные уязвимости

ubuntu
почти 20 лет назад

pam_ldap and nss_ldap, when used with OpenLDAP and connecting to a slave using TLS, does not use TLS for the subsequent connection if the client is referred to a master, which may cause a password to be sent in cleartext and allows remote attackers to sniff the password.

redhat
почти 20 лет назад

pam_ldap and nss_ldap, when used with OpenLDAP and connecting to a slave using TLS, does not use TLS for the subsequent connection if the client is referred to a master, which may cause a password to be sent in cleartext and allows remote attackers to sniff the password.

nvd
почти 20 лет назад

pam_ldap and nss_ldap, when used with OpenLDAP and connecting to a slave using TLS, does not use TLS for the subsequent connection if the client is referred to a master, which may cause a password to be sent in cleartext and allows remote attackers to sniff the password.

msrc
больше 4 лет назад

Описание отсутствует

debian
почти 20 лет назад

pam_ldap and nss_ldap, when used with OpenLDAP and connecting to a sla ...

EPSS

Процентиль: 86%
0.02839
Низкий

Дефекты

CWE-319