CVE-2005-2069

NameCVE-2005-2069
Descriptionpam_ldap and nss_ldap, when used with OpenLDAP and connecting to a slave using TLS, does not use TLS for the subsequent connection if the client is referred to a master, which may cause a password to be sent in cleartext and allows remote attackers to sniff the password.
SourceCVE (at NVD; LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-785-1
NVD severitymedium (attack range: remote)
Debian Bugs316674, 316972, 316973

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libnss-ldap (PTS)wheezy264-2.5fixed
stretch, sid, jessie265-3fixed
libpam-ldap (PTS)wheezy184-8.6fixed
jessie184-8.7fixed
stretch, sid186-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libnss-ldapsource(unstable)238-1.1medium316973
libpam-ldapsource(unstable)178-1sarge1medium316972
libpam-ldapsourcesarge178-1sarge1mediumDSA-785-1
libpam-ldapsourcewoody(not affected)DSA-785-1
openldap2source(unstable)2.1.30-11medium
openldap2.2source(unstable)2.2.26-3medium316674

Search for package or bug name: Reporting problems