CVE-2005-2069

NameCVE-2005-2069
Descriptionpam_ldap and nss_ldap, when used with OpenLDAP and connecting to a slave using TLS, does not use TLS for the subsequent connection if the client is referred to a master, which may cause a password to be sent in cleartext and allows remote attackers to sniff the password.
SourceCVE (at NVD; oss-sec, fulldisc, OSVDB, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, more)
ReferencesDSA-785-1
NVD severitymedium (attack range: remote)
Debian Bugs316674, 316972, 316973
Debian/oldstablenot vulnerable.
Debian/stablenot vulnerable.
Debian/testingnot vulnerable.
Debian/unstablenot vulnerable.

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libnss-ldap (PTS)squeeze264-2.2fixed
wheezy264-2.5fixed
jessie, sid265-3fixed
libpam-ldap (PTS)squeeze184-8.5fixed
wheezy184-8.6fixed
jessie, sid184-8.7fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libnss-ldapsource(unstable)238-1.1medium316973
libpam-ldapsource(unstable)178-1sarge1medium316972
libpam-ldapsourcesarge178-1sarge1mediumDSA-785-1
libpam-ldapsourcewoody(not affected)DSA-785-1
openldap2source(unstable)2.1.30-11medium
openldap2.2source(unstable)2.2.26-3medium316674

Search for package or bug name: Reporting problems