- Description
- pam_ldap and nss_ldap, when used with OpenLDAP and connecting to a slave using TLS, does not use TLS for the subsequent connection if the client is referred to a master, which may cause a password to be sent in cleartext and allows remote attackers to sniff the password.
- Source
- secalert@redhat.com
- NVD status
- Analyzed
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
- nvd@nist.gov
- CWE-319
- Hype score
- Not currently trending
- Red HatRed Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:padl:nss_ldap:-:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "558C8B99-55C2-42AE-9959-07A6944DA926"
},
{
"criteria": "cpe:2.3:a:padl:pam_ldap:-:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "21C67252-5F59-48D2-9569-E616BFAAA607"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "FF6CF2B3-671F-425B-8F2A-20E909249C84"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
]