Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2005-2069

Опубликовано: 30 июн. 2005
Источник: ubuntu
Приоритет: untriaged
EPSS Низкий
CVSS2: 5

Описание

pam_ldap and nss_ldap, when used with OpenLDAP and connecting to a slave using TLS, does not use TLS for the subsequent connection if the client is referred to a master, which may cause a password to be sent in cleartext and allows remote attackers to sniff the password.

РелизСтатусПримечание
dapper

released

238-1.1ubuntu1
edgy

ignored

end of life, was needed
feisty

ignored

end of life, was needed
upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

released

2.1.30-12ubuntu3
devel

released

2.1.30-12ubuntu3
edgy

released

2.1.30-12ubuntu3
feisty

released

2.1.30-12ubuntu3
upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

released

2.2.26-5ubuntu2.2
devel

DNE

edgy

released

2.2.26-5ubuntu3.1
feisty

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

released

2.3.30-2
edgy

DNE

feisty

released

2.3.30-2
upstream

needs-triage

Показывать по

EPSS

Процентиль: 86%
0.02839
Низкий

5 Medium

CVSS2

Связанные уязвимости

redhat
почти 20 лет назад

pam_ldap and nss_ldap, when used with OpenLDAP and connecting to a slave using TLS, does not use TLS for the subsequent connection if the client is referred to a master, which may cause a password to be sent in cleartext and allows remote attackers to sniff the password.

nvd
почти 20 лет назад

pam_ldap and nss_ldap, when used with OpenLDAP and connecting to a slave using TLS, does not use TLS for the subsequent connection if the client is referred to a master, which may cause a password to be sent in cleartext and allows remote attackers to sniff the password.

msrc
больше 4 лет назад

Описание отсутствует

debian
почти 20 лет назад

pam_ldap and nss_ldap, when used with OpenLDAP and connecting to a sla ...

github
около 3 лет назад

pam_ldap and nss_ldap, when used with OpenLDAP and connecting to a slave using TLS, does not use TLS for the subsequent connection if the client is referred to a master, which may cause a password to be sent in cleartext and allows remote attackers to sniff the password.

EPSS

Процентиль: 86%
0.02839
Низкий

5 Medium

CVSS2