FreeBSD : pam_ldap -- authentication bypass vulnerability (38c76fcf-1744-11da-978e-0001020eed82)

This script is Copyright (C) 2006-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Luke Howard reports :

If a pam_ldap client authenticates against an LDAP server that returns
a passwordPolicyResponse control, but omits the optional 'error' field
of the PasswordPolicyResponseValue, then the LDAP authentication
result will be ignored and the authentication step will always
succeed.

See also :

https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=166163
http://www.nessus.org/u?4b58495c

Solution :

Update the affected package.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 21413 (freebsd_pkg_38c76fcf174411da978e0001020eed82.nasl)

Bugtraq ID:

CVE ID: CVE-2005-2641

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now