CVE-2005-2069

NameCVE-2005-2069
Descriptionpam_ldap and nss_ldap, when used with OpenLDAP and connecting to a slave using TLS, does not use TLS for the subsequent connection if the client is referred to a master, which may cause a password to be sent in cleartext and allows remote attackers to sniff the password.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-785-1
Debian Bugs316674, 316972, 316973

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libnss-ldap (PTS)buster265-5fixed
bullseye265-6fixed
libpam-ldap (PTS)buster, bullseye186-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libnss-ldapsource(unstable)238-1.1medium316973
libpam-ldapsourcewoody(not affected)DSA-785-1
libpam-ldapsourcesarge178-1sarge1mediumDSA-785-1
libpam-ldapsource(unstable)178-1sarge1medium316972
openldap2source(unstable)2.1.30-11medium
openldap2.2source(unstable)2.2.26-3medium316674

Search for package or bug name: Reporting problems