blob: 9023f088996b7f6599dfe457e469e1f43d9e44d4 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200508-22">
<title>pam_ldap: Authentication bypass vulnerability</title>
pam_ldap contains a vulnerability that may allow a remote attacker to gain
system access.
<product type="ebuild">pam_ldap</product>
<announced>August 31, 2005</announced>
<revised>August 31, 2005: 01</revised>
<package name="sys-auth/pam_ldap" auto="yes" arch="*">
<unaffected range="ge">180</unaffected>
<vulnerable range="lt">180</vulnerable>
pam_ldap is a Pluggable Authentication Module which allows
authentication against LDAP directories.
When a pam_ldap client attempts to authenticate against an LDAP
server that omits the optional error value from the
PasswordPolicyResponseValue, the authentication attempt will always
<impact type="normal">
A remote attacker may exploit this vulnerability to bypass the
LDAP authentication mechanism, gaining access to the system possibly
with elevated privileges.
There is no known workaround at this time.
All pam_ldap users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=sys-auth/pam_ldap-180&quot;</code>
<uri link="">CAN-2005-2641</uri>
<uri link="">US-CERT VU#778916</uri>
<metadata tag="requester" timestamp="Mon, 29 Aug 2005 14:50:51 +0000">
<metadata tag="bugReady" timestamp="Mon, 29 Aug 2005 14:51:34 +0000">
<metadata tag="submitter" timestamp="Mon, 29 Aug 2005 20:08:30 +0000">