IBM Tivoli Directory Server Vulnerabilities (credentialed check)

critical Nessus Plugin ID 53625


The version of IBM Tivoli Directory Server installed on the remote host contains multiple security vulnerabilities.


According to its version, the installation of IBM Tivoli Directory Server on the remote host is prior to,,, or It is, therefore, affected by one or more of the following vulnerabilities :

- A malicious LDAP request can cause a buffer overrun in the server, allowing an unauthenticated, remote attacker to execute arbitrary code within Tivoli Directory Server's server process. This vulnerability has only been recreated on 32 bit platforms. (IO14010, IO14013, IO14028, IO14046, IO14045)

- A security vulnerability has been identified in Tivoli Directory server. If the Server is configured to audit extended operations with 'Attributes sent on group evaluation extended operation' enabled (ibm-auditAttributesOnGroupEvalOp=TRUE), the audit entries for the group eval extended op will include unmasked values for sensitive data. (IO14023, IO14025, IO14028, IO14043, IO14044)


Install the appropriate fix based on the vendor's advisory :


See Also

Plugin Details

Severity: Critical

ID: 53625

File Name: tivoli_directory_svr_6303.nasl

Version: 1.12

Type: local

Agent: windows

Family: Windows

Published: 5/2/2011

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information


Risk Factor: High

Score: 7.4


Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:ibm:tivoli_directory_server

Required KB Items: installed_sw/IBM Security Directory Server

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/1/2011

Vulnerability Publication Date: 4/1/2011

Exploitable With

Core Impact

Reference Information

CVE: CVE-2011-1206

BID: 47121