Lucene search

K
f5F5F5:K5716
HistoryMar 28, 2013 - 12:00 a.m.

K5716 : Authentication bypass in PAM LDAP module - CAN-2005-2641

2013-03-2800:00:00
my.f5.com
23

6.4 Medium

AI Score

Confidence

Low

0.021 Low

EPSS

Percentile

89.3%

Security Advisory Description

Note: Versions that are not listed in this article have not been evaluated for vulnerability to this security advisory. For information about the F5 security policy regarding evaluating older and unsupported versions of F5 products, refer to K4602: Overview of the F5 security vulnerability response policy.

F5 products and versions that have been evaluated for this Security Advisory

Product Affected Not Affected
BIG-IP LTM None 9.x
10.x
11.x
BIG-IP GTM None 9.x
10.x
11.x
BIG-IP ASM None 9.x
10.x
11.x
BIG-IP Link Controller None 9.x
10.x
11.x
BIG-IP WebAccelerator None 9.x
10.x
11.x
BIG-IP PSM None 9.x
10.x
11.x
BIG-IP WAN Optimization None 10.x
11.x
BIG-IP APM None 10.x
11.x
BIG-IP Edge Gateway None 10.x
11.x
BIG-IP Analytics None 11.x
BIG-IP AFM None 11.x
BIG-IP PEM None 11.x
FirePass None 5.x
6.x
7.x
Enterprise Manager None 1.x
2.x
3.x
ARX None 2.x
3.x
4.x
5.x
6.x

Vulnerability in pam_ldap before 180 does not properly handle a new password policy control, which could allow attackers to gain privileges.

Information about this advisory is available at the following locations:

6.4 Medium

AI Score

Confidence

Low

0.021 Low

EPSS

Percentile

89.3%