Versio.io

CVE-2006-5170

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 10-10-2006 06:06
Last modified: - 25-02-2022 08:20
Total changes: - 3

Description

pam_ldap in nss_ldap on Red Hat Enterprise Linux 4, Fedora Core 3 and earlier, and possibly other distributions does not return an error condition when an LDAP directory server responds with a PasswordPolicyResponse control response, which causes the pam_authenticate function to return a success code even if authentication has failed, as originally reported for xscreensaver.

Common Vulnerability Scoring System (CVSS)

AV:N/AC:L/Au:N/C:P/I:P/A:P
Low
Attack complexity
Network
Attack vector
Low
Availability
Low
Confidentiality
Low
Integrity
-
Privileges required
-
Scope
-
User interaction
7.5
Base score
10.0
6.4
Exploitability score
Impact score
 

Verification logic

OR
OR
vendor=Red Hat Enterprise Linux AND product=enterprise_linux AND version=4.0 AND edition=linux_kernel_2.6.9
vendor=fedoraproject AND product=fedora_core AND versionEndIncluding=core_3.0
OR
vendor=Red Hat Enterprise Linux AND product=enterprise_linux AND version=4.0
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_desktop AND version=4.0
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_for_ibm_z_systems AND version=4.0_s390
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_for_ibm_z_systems AND version=4.0_s390x
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_for_power_big_endian AND version=4.0
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_server AND version=4.0
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_workstation AND version=4.0
OR
vendor=Debian AND product=debian_linux AND version=3.1
 

Reference

 


Keywords

NVD

 

CVE-2006-5170

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.