|
|
Subscribe / Log in / New account

rPath alert rPSA-2006-0183-1 (nss_ldap)

From:  rPath Update Announcements <announce-noreply@rpath.com>
To:  security-announce@lists.rpath.com, update-announce@lists.rpath.com
Subject:  rPSA-2006-0183-1 nss_ldap
Date:  Thu, 05 Oct 2006 17:46:26 -0400
Cc:  full-disclosure@lists.grok.org.uk, bugtraq@securityfocus.com, lwn@lwn.net

rPath Security Advisory: 2006-0183-1 Published: 2006-10-05 Products: rPath Linux 1 Rating: Major Exposure Level Classification: Deterministic Unauthorized Access Updated Versions: nss_ldap=/conary.rpath.com@rpl:devel//1/239-9.1-1 References: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-200... http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-200... https://issues.rpath.com/browse/RPL-680 Description: Previous versions of the nss_ldap package do not properly handle accounts locked using the PasswordPolicyResponse control response, allowing potential unauthorized access from locked accounts when systems are configured to use LDAP authentication. rPath Linux is not configured to use LDAP authentication by default.


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds