Mandrake Linux Security Advisory : nss_ldap (MDKSA-2005:121)

Medium Nessus Plugin ID 19226


The remote Mandrake Linux host is missing one or more security updates.


Rob Holland, of the Gentoo Security Audit Team, discovered that pam_ldap and nss_ldap would not use TLS for referred connections if they are referred to a master after connecting to a slave, regardless of the 'ssl start_tls' setting in ldap.conf.

As well, a bug in nss_ldap in Corporate Server and Mandrake 10.0 has been fixed that caused crond, and other applications, to crash as a result of clients receiving a SIGPIPE signal when attempting to issue a new search request to a directory server that is no longer available.

The updated packages have been patched to address this issue.


Update the affected nss_ldap and / or pam_ldap packages.

Plugin Details

Severity: Medium

ID: 19226

File Name: mandrake_MDKSA-2005-121.nasl

Version: $Revision: 1.16 $

Type: local

Published: 2005/07/19

Modified: 2015/03/19

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:ND/RL:OF/RC:ND

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:nss_ldap, p-cpe:/a:mandriva:linux:pam_ldap, cpe:/o:mandrakesoft:mandrake_linux:10.0, cpe:/o:mandrakesoft:mandrake_linux:10.1, x-cpe:/o:mandrakesoft:mandrake_linux:le2005

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: No exploit is required

Patch Publication Date: 2005/07/18

Reference Information

CVE: CVE-2005-2069, CVE-2005-2377

BID: 14125, 14126

MDKSA: 2005:121