Mandrake Linux Security Advisory : nss_ldap (MDKSA-2005:121)

medium Nessus Plugin ID 19226

Synopsis

The remote Mandrake Linux host is missing one or more security updates.

Description

Rob Holland, of the Gentoo Security Audit Team, discovered that pam_ldap and nss_ldap would not use TLS for referred connections if they are referred to a master after connecting to a slave, regardless of the 'ssl start_tls' setting in ldap.conf.

As well, a bug in nss_ldap in Corporate Server and Mandrake 10.0 has been fixed that caused crond, and other applications, to crash as a result of clients receiving a SIGPIPE signal when attempting to issue a new search request to a directory server that is no longer available.

The updated packages have been patched to address this issue.

Solution

Update the affected nss_ldap and / or pam_ldap packages.

Plugin Details

Severity: Medium

ID: 19226

File Name: mandrake_MDKSA-2005-121.nasl

Version: 1.20

Type: local

Published: 7/19/2005

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:nss_ldap, p-cpe:/a:mandriva:linux:pam_ldap, cpe:/o:mandrakesoft:mandrake_linux:10.0, cpe:/o:mandrakesoft:mandrake_linux:10.1, x-cpe:/o:mandrakesoft:mandrake_linux:le2005

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 7/18/2005

Reference Information

CVE: CVE-2005-2069, CVE-2005-2377

BID: 14125, 14126

MDKSA: 2005:121