ID |
CVE-2006-1782
|
Summary |
Unspecified vulnerability in Solaris 8 and 9 allows local users to obtain the LDAP Directory Server root Distinguished Name (rootDN) password when a privileged user (1) runs idsconfig; or "insecurely" runs LDAP2 commands with the -w option, including (2) ldapadd, (3) ldapdelete, (4) ldapmodify, (5) ldapmodrdn, and (6) ldapsearch. |
References |
|
Vulnerable Configurations |
|
CVSS |
Base: | 2.1 (as of 30-10-2018 - 16:25) |
Impact: | |
Exploitability: | |
|
CWE |
NVD-CWE-Other |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
LOCAL |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
PARTIAL |
NONE |
NONE |
|
cvss-vector
via4
|
AV:L/AC:L/Au:N/C:P/I:N/A:N
|
oval
via4
|
accepted | 2006-05-31T09:45:00.000-04:00 | class | vulnerability | contributors | name | Robert L. Hollis | organization | ThreatGuard, Inc. |
| description | Unspecified vulnerability in Solaris 8 and 9 allows local users to obtain the LDAP Directory Server root Distinguished Name (rootDN) password when a privileged user (1) runs idsconfig; or "insecurely" runs LDAP2 commands with the -w option, including (2) ldapadd, (3) ldapdelete, (4) ldapmodify, (5) ldapmodrdn, and (6) ldapsearch. | family | unix | id | oval:org.mitre.oval:def:1840 | status | accepted | submitted | 2006-04-14T06:41:00.000-04:00 | title | LDAP rootDN Password Disclosure Vulnerability | version | 36 |
|
refmap
via4
|
|
Last major update |
30-10-2018 - 16:25 |
Published |
13-04-2006 - 10:02 |
Last modified |
30-10-2018 - 16:25 |