CVE-2005-2069

N/A Unknown
Published: June 30, 2005 Modified: April 16, 2026
View on NVD

Description

pam_ldap and nss_ldap, when used with OpenLDAP and connecting to a slave using TLS, does not use TLS for the subsequent connection if the client is referred to a master, which may cause a password to be sent in cleartext and allows remote attackers to sniff the password.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://bugs.gentoo.org/show_bug.cgi?id=96767
Source: secalert@redhat.com
Third Party Advisory
http://bugzilla.padl.com/show_bug.cgi?id=210
Source: secalert@redhat.com
Issue Tracking Patch Vendor Advisory
http://bugzilla.padl.com/show_bug.cgi?id=211
Source: secalert@redhat.com
Issue Tracking Vendor Advisory
http://secunia.com/advisories/17233
Source: secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/17845
Source: secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/21520
Source: secalert@redhat.com
Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2006-157.htm
Source: secalert@redhat.com
Third Party Advisory
http://www.gentoo.org/security/en/glsa/glsa-200507-13.xml
Source: secalert@redhat.com
Third Party Advisory
http://www.openldap.org/its/index.cgi/Incoming?id=3791
Source: secalert@redhat.com
Patch Vendor Advisory
http://www.osvdb.org/17692
Source: secalert@redhat.com
Broken Link
http://www.redhat.com/support/errata/RHSA-2005-751.html
Source: secalert@redhat.com
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2005-767.html
Source: secalert@redhat.com
Third Party Advisory
http://www.securityfocus.com/bid/14125
Source: secalert@redhat.com
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/14126
Source: secalert@redhat.com
Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/usn-152-1
Source: secalert@redhat.com
Third Party Advisory
http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:121
Source: secalert@redhat.com
Third Party Advisory
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=161990
Source: secalert@redhat.com
Issue Tracking Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/21245
Source: secalert@redhat.com
Third Party Advisory VDB Entry
http://archives.neohapsis.com/archives/fulldisclosure/2005-07/0060.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://bugs.gentoo.org/show_bug.cgi?id=96767
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://bugzilla.padl.com/show_bug.cgi?id=210
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Patch Vendor Advisory
http://bugzilla.padl.com/show_bug.cgi?id=211
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Vendor Advisory
http://secunia.com/advisories/17233
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/17845
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/21520
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2006-157.htm
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.gentoo.org/security/en/glsa/glsa-200507-13.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.openldap.org/its/index.cgi/Incoming?id=3791
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.osvdb.org/17692
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.redhat.com/support/errata/RHSA-2005-751.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2005-767.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.securityfocus.com/bid/14125
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/14126
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/usn-152-1
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:121
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=161990
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/21245
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9445
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory

40 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
2.8%
86th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

padl openldap