search menu icon-carat-right cmu-wordmark

CERT Coordination Center

pam_ldap authentication bypass vulnerability

Vulnerability Note VU#778916

Original Release Date: 2005-08-24 | Last Revised: 2005-11-02

Overview

An error in the pam_ldap password policy control may allow a remote attacker to gain access to a system.

Description

pam_ldap provides LDAP authentication services for UNIX-based systems. A vulnerability in pam_ldap may allow a remote attacker to bypass the authentication mechanism. If a pam_ldap client attempts to authenticate against an LDAP server that omits the optional error value from the PasswordPolicyResponseValue, the authentication attempt will always succeed.

Note that this vulnerability affects all versions of pam_ldap since version pam_ldap-169. However, if the underlying LDAP client library does not support LDAP version 3 controls, then this vulnerability is not present.

Impact

An unauthenticated, remote attacker may be able to bypass the pam_ldap authentication mechanism and gain access to a system, possibly with elevated privileges.

Solution

Upgrade pam_ldap

This vulnerability was corrected in pam_ldap-180.

Vendor Information

778916
 

View all 32 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported by Luke Howard of PADL.

This document was written by Jeff Gennari.

Other Information

CVE IDs: CVE-2005-2641
Severity Metric: 8.15
Date Public: 2005-08-24
Date First Published: 2005-08-24
Date Last Updated: 2005-11-02 17:47 UTC
Document Revision: 66

Sponsored by CISA.