Executive Summary
Summary | |
---|---|
Title | New libpam-ldap packages fix authentication bypass |
Informations | |||
---|---|---|---|
Name | DSA-785 | First vendor Publication | 2005-08-25 |
Vendor | Debian | Last vendor Modification | 2005-08-25 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
It has been discovered that libpam-ldap, the Pluggable Authentication Module allowing LDAP interfaces, ignores the result of an attempt to authenticate against an LDAP server that does not set an optional data field. The old stable distribution (woody) is not affected by this problem. For the stable distribution (sarge) this problem has been fixed in version 178-1sarge1. For the unstable distribution (sid) this problem has been fixed in version 178-1sarge1. We recommend that you upgrade your libpam-ldap package. |
Original Source
Url : http://www.debian.org/security/2005/dsa-785 |
Alert History
Date | Informations |
---|---|
2016-04-26 17:41:08 |
|
2014-02-17 11:34:15 |
|
2013-05-11 12:19:05 |
|