search menu icon-carat-right cmu-wordmark

CERT Coordination Center

IBM AIX "secldapclntd" daemon authentication vulnerability

Vulnerability Note VU#624713

Original Release Date: 2003-04-02 | Last Revised: 2003-04-17

Overview

A vulnerability in the secldapclntd daemon in IBM's AIX operating system could allow unauthorized remote users to modify accounts on the system.

Description

According to the IBM bulletin for this issue:

"The secldapclntd daemon accepts requests from the LDAP load module, forwards requests to the LDAP server, and passes results from the server back to the LDAP loadmodule. The secldapclntd daemon uses an internet socket to communicate with the loadmodule. A remote user can craft a message to communicate with the daemon and gain unauthorized access to data or could potentially modify user accounts on the LDAP server."

This exposes a vulnerability in environments that use an LDAP (Lightweight Directory Access Protocol) database for user authentication.

Impact

A remote attacker can gain unauthorized access to data or modify user accounts on the system. It is unclear whether this vulnerability can be leveraged to gain root or other system-level access to the affected systems.

Solution

Apply a patch from the vendor

IBM has released patches to address this vulnerability; please see the vendor section of this document for further details.

Vendor Information

624713
 

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This issue was discovered by Tom Lu of IBM's AIX Security Team.

This document was written by Chad R Dougherty.

Other Information

CVE IDs: CVE-2003-0119
Severity Metric: 15.82
Date Public: 2003-02-21
Date First Published: 2003-04-02
Date Last Updated: 2003-04-17 18:06 UTC
Document Revision: 7

Sponsored by CISA.