Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2006-5170


pam_ldap in nss_ldap on Red Hat Enterprise Linux 4, Fedora Core 3 and earlier, and possibly other distributions does not return an error condition when an LDAP directory server responds with a PasswordPolicyResponse control response, which causes the pam_authenticate function to return a success code even if authentication has failed, as originally reported for xscreensaver.


Published

2006-10-10T04:06:00.000

Last Modified

2025-04-09T00:30:58.490

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 7.5 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

10.0

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-755

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System fedoraproject fedora_core ≤ core_3.0 Yes
Operating System redhat enterprise_linux 4.0 Yes
Operating System redhat enterprise_linux 4.0 Yes
Operating System redhat enterprise_linux_desktop 4.0 Yes
Operating System redhat enterprise_linux_for_ibm_z_systems 4.0_s390 Yes
Operating System redhat enterprise_linux_for_ibm_z_systems 4.0_s390x Yes
Operating System redhat enterprise_linux_for_power_big_endian 4.0 Yes
Operating System redhat enterprise_linux_server 4.0 Yes
Operating System redhat enterprise_linux_workstation 4.0 Yes
Operating System debian debian_linux 3.1 Yes

References