Lucene search

K
gentooGentoo FoundationGLSA-200507-13
HistoryJul 14, 2005 - 12:00 a.m.

pam_ldap and nss_ldap: Plain text authentication leak

2005-07-1400:00:00
Gentoo Foundation
security.gentoo.org
12

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.009 Low

EPSS

Percentile

82.8%

Background

pam_ldap is a Pluggable Authentication Module which allows authentication against an LDAP directory. nss_ldap is a Name Service Switch module which allows ‘passwd’, ‘group’ and ‘host’ database information to be pulled from LDAP. TLS is Transport Layer Security, a protocol that allows encryption of network communications.

Description

Rob Holland of the Gentoo Security Audit Team discovered that pam_ldap and nss_ldap fail to use TLS for referred connections if they are referred to a master after connecting to a slave, regardless of the “ssl start_tls” ldap.conf setting.

Impact

An attacker could sniff passwords or other sensitive information as the communication is not encrypted.

Workaround

pam_ldap and nss_ldap can be set to force the use of SSL instead of TLS.

Resolution

All pam_ldap users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=sys-auth/pam_ldap-178-r1"

All nss_ldap users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose sys-auth/nss_ldap
OSVersionArchitecturePackageVersionFilename
Gentooanyallsys-auth/nss_ldap< 239-r1UNKNOWN
Gentooanyallsys-auth/pam_ldap< 178-r1UNKNOWN

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.009 Low

EPSS

Percentile

82.8%