Vulnerability Details : CVE-2006-5170
pam_ldap in nss_ldap on Red Hat Enterprise Linux 4, Fedora Core 3 and earlier, and possibly other distributions does not return an error condition when an LDAP directory server responds with a PasswordPolicyResponse control response, which causes the pam_authenticate function to return a success code even if authentication has failed, as originally reported for xscreensaver.
Exploit prediction scoring system (EPSS) score for CVE-2006-5170
Probability of exploitation activity in the next 30 days: 0.46%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 72 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2006-5170
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2006-5170
-
The product does not handle or incorrectly handles an exceptional condition.Assigned by: nvd@nist.gov (Primary)
References for CVE-2006-5170
-
http://securitytracker.com/id?1017153
Third Party Advisory;VDB Entry
-
http://www.novell.com/linux/security/advisories/2006_27_sr.html
404 Page Not Found | SUSEBroken Link;Vendor Advisory
-
http://www.vupen.com/english/advisories/2006/4319
Third Party Advisory
-
http://www.debian.org/security/2006/dsa-1203
Issue Tracking;Patch;Vendor Advisory
-
http://security.gentoo.org/glsa/glsa-200612-19.xml
Vendor Advisory
-
http://www.securityfocus.com/bid/20880
Third Party Advisory;VDB Entry
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10418
Third Party Advisory
-
http://www.securityfocus.com/archive/1/447859/100/200/threaded
Third Party Advisory;VDB Entry
-
http://www.trustix.org/errata/2006/0061/
Broken Link;Third Party Advisory
-
http://www.mandriva.com/security/advisories?name=MDKSA-2006:201
Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2006-0719.html
Vendor Advisory
-
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=207286
Issue Tracking;Vendor Advisory
-
https://issues.rpath.com/browse/RPL-680
Broken Link;Third Party Advisory
-
http://bugzilla.padl.com/show_bug.cgi?id=291
Broken Link;Issue Tracking;Vendor Advisory
Products affected by CVE-2006-5170
- cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:4.0:*:linux_kernel_2.6.9:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:4.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:4.0_s390:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:4.0_s390x:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora_core:*:*:*:*:*:*:*:*