IBM AIX "secldapclntd" daemon authentication vulnerability

ID VU:624713
Type cert
Reporter CERT
Modified 2003-04-17T00:00:00



A vulnerability in the secldapclntd daemon in IBM's AIX operating system could allow unauthorized remote users to modify accounts on the system.


According to the IBM bulletin for this issue:

"The secldapclntd daemon accepts requests from the LDAP load module, forwards requests to the LDAP server, and passes results from the server back to the LDAP loadmodule. The secldapclntd daemon uses an internet socket to communicate with the loadmodule. A remote user can craft a message to communicate with the daemon and gain unauthorized access to data or could potentially modify user accounts on the LDAP server."

This exposes a vulnerability in environments that use an LDAP (Lightweight Directory Access Protocol) database for user authentication.


A remote attacker can gain unauthorized access to data or modify user accounts on the system. It is unclear whether this vulnerability can be leveraged to gain root or other system-level access to the affected systems.


Apply a patch from the vendor

IBM has released patches to address this vulnerability; please see the vendor section of this document for further details.

Systems Affected

Vendor| Status| Date Notified| Date Updated
IBM| | 10 Mar 2003| 24 Mar 2003
If you are a vendor and your product is affected, let us know.

CVSS Metrics

Group | Score | Vector
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | N/A | N/A


  • <>
  • <>
  • <>
  • <>


This issue was discovered by Tom Lu of IBM's AIX Security Team.

This document was written by Chad R Dougherty.

Other Information

  • CVE IDs: CAN-2003-0119
  • Date Public: 21 Feb 2003
  • Date First Published: 02 Apr 2003
  • Date Last Updated: 17 Apr 2003
  • Severity Metric: 15.82
  • Document Revision: 7