DEBIAN-CVE-2005-2069

Source
https://security-tracker.debian.org/tracker/CVE-2005-2069
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2005-2069.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2005-2069
Upstream
Downstream
Published
2005-06-30T04:00:00Z
Modified
2025-11-19T02:04:38.858600Z
Summary
[none]
Details

pamldap and nssldap, when used with OpenLDAP and connecting to a slave using TLS, does not use TLS for the subsequent connection if the client is referred to a master, which may cause a password to be sent in cleartext and allows remote attackers to sniff the password.

References

Affected packages

Debian:11 / libnss-ldap

Package

Name
libnss-ldap
Purl
pkg:deb/debian/libnss-ldap?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
238-1.1

Ecosystem specific

{
    "urgency": "medium"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2005-2069.json"

Debian:11 / libpam-ldap

Package

Name
libpam-ldap
Purl
pkg:deb/debian/libpam-ldap?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
178-1sarge1

Ecosystem specific

{
    "urgency": "medium"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2005-2069.json"