var-200409-0015
Vulnerability from variot

OpenLDAP 1.0 through 2.1.19, as used in Apple Mac OS 10.3.4 and 10.3.5 and possibly other operating systems, may allow certain authentication schemes to use hashed (crypt) passwords in the userPassword attribute as if they were plaintext passwords, which allows remote attackers to re-use hashed passwords without decrypting them. There is a vulnerability in the Apple QuickTime Streaming Server that could allow a remote attacker to cause a denial-of-service condition. There is a vulnerability in the Mac OS X CoreFoundation framework that could allow a local attacker to execute arbitrary code. OpenLDAP In using a specific authentication scheme userPassword There is a flaw that prevents password authentication if the password value is obtained because the value stored in is not processed as plain text.Password authentication may be avoided. In certain undisclosed cases, OpenLDAP is reported prone to an ambiguous-password-attribute weakness. If an attacker can retrieve a password hash as contained in the OpenLDAP database, they may then be able to directly authenticate to the LDAP database. The attacker may gain unauthorized access if they can sniff password hashes from the network or if they can retrieve the contents of the 'userPassword' attribute from a database backup or through weak permissions on the database. The OpenLDAP that is included with Apple Mac OS X, versions 10.3.4 and 10.3.5, is reported affected. Versions of OpenLDAP included in other operating systems may also be affected. There is a problem in OpenLDAP's verification of CRYPT passwords. Remote attackers can use this vulnerability to log in using other users' CRYPT values ​​as passwords. An attacker can log in with the target user's authority by using the CRYPT value of the target user's password. Apple reports that CRYPT passwords can be specified as a clear text password as userPassword. According to reports, some authentication mechanisms can use CRYPT values ​​as plaintext passwords.

TITLE: Red Hat update for openldap / nss_ldap

SECUNIA ADVISORY ID: SA17233

VERIFY ADVISORY: http://secunia.com/advisories/17233/

CRITICAL: Moderately critical

IMPACT: Security Bypass, Exposure of sensitive information

WHERE:

From remote

OPERATING SYSTEM: RedHat Linux Advanced Workstation 2.1 for Itanium http://secunia.com/product/1326/ RedHat Enterprise Linux WS 4 http://secunia.com/product/4670/ RedHat Enterprise Linux WS 3 http://secunia.com/product/2536/ RedHat Enterprise Linux WS 2.1 http://secunia.com/product/1044/ RedHat Enterprise Linux ES 4 http://secunia.com/product/4668/ RedHat Enterprise Linux ES 3 http://secunia.com/product/2535/ RedHat Enterprise Linux ES 2.1 http://secunia.com/product/1306/ RedHat Enterprise Linux AS 4 http://secunia.com/product/4669/ RedHat Enterprise Linux AS 3 http://secunia.com/product/2534/ RedHat Enterprise Linux AS 2.1 http://secunia.com/product/48/

DESCRIPTION: Red Hat has issued updates for openldap / nss_ldap. This fixes two security issues and a vulnerability, which can be exploit by malicious people to gain knowledge of sensitive information or bypass certain security restrictions.

For more information: SA15906 SA16518 SA12491

SOLUTION: Updated packages are available from Red Hat Network. http://rhn.redhat.com/

ORIGINAL ADVISORY: http://rhn.redhat.com/errata/RHSA-2005-767.html http://rhn.redhat.com/errata/RHSA-2005-751.html

OTHER REFERENCES: SA15906: http://secunia.com/advisories/15906/

SA16518: http://secunia.com/advisories/16518/

SA12491: http://secunia.com/advisories/12491/


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200409-0015",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": null,
        "scope": null,
        "trust": 2.4,
        "vendor": "apple computer",
        "version": null
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.3.4"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.3.5"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.3.4"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.2.8"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.3.5"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.2.8"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "2.1.19"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "2.1.18"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "2.1.17"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "2.1.16"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "2.1.15"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "2.1.14"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "2.1.13"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "2.1.12"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "2.1.11"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "2.1.10"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "2.1.4"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "2.0.27"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "2.0.25"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "2.0.23"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "2.0.22"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "2.0.21"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "2.0.20"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "2.0.19"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "2.0.18"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "2.0.17"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "2.0.16"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "2.0.15"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "2.0.14"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "2.0.13"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "2.0.12"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "2.0.11"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "2.0.10"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "2.0.9"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "2.0.8"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "2.0.7"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "2.0.6"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "2.0.5"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "2.0.4"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "2.0.3"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "2.0.2"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "2.0.1"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "2.0"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "1.2.13"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "1.2.12"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "1.2.11"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "1.2.10"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "1.2.9"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "1.2.8"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "1.2.7"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "1.2.6"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "1.2.5"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "1.2.4"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "1.2.3"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "1.2.2"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "1.2.1"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "1.2"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "1.1.4"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "1.1.3"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "1.1.2"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "1.1.1"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "1.1"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "1.0.3"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "1.0.2"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "1.0.1"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openldap",
        "version": "1.0"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "openldap",
        "version": "2.1_.20"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "openldap",
        "version": "2.0.11_9"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "openldap",
        "version": "2.0.11_11"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "openldap",
        "version": "2.0.11_11s"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "2.1 (as)"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "2.1 (es)"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "2.1 (ws)"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "3 (as)"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "3 (es)"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "3 (ws)"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "openldap",
        "version": "2.1.20"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "openldap",
        "version": "2.0.11-9"
      },
      {
        "model": "-11s",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "openldap",
        "version": "2.0.11"
      },
      {
        "model": "openldap",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "openldap",
        "version": "2.0.11-11"
      },
      {
        "model": "s8710 r2.0.1",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "s8710 r2.0.0",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "s8700 r2.0.1",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "s8700 r2.0.0",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "s8500 r2.0.1",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "s8500 r2.0.0",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "s8300 r2.0.1",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "s8300 r2.0.0",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "messaging storage server",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "message networking",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "intuity lx",
        "scope": null,
        "trust": 0.3,
        "vendor": "avaya",
        "version": null
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.5"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.4"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.8"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.5"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.8"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#914870"
      },
      {
        "db": "CERT/CC",
        "id": "VU#545446"
      },
      {
        "db": "CERT/CC",
        "id": "VU#704110"
      },
      {
        "db": "BID",
        "id": "11137"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000366"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200409-014"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0823"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:redhat:enterprise_linux",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000366"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Apple",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200409-014"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2004-0823",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2004-0823",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-9253",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2004-0823",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#914870",
            "trust": 0.8,
            "value": "1.73"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#545446",
            "trust": 0.8,
            "value": "9.62"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#704110",
            "trust": 0.8,
            "value": "5.91"
          },
          {
            "author": "NVD",
            "id": "CVE-2004-0823",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200409-014",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-9253",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#914870"
      },
      {
        "db": "CERT/CC",
        "id": "VU#545446"
      },
      {
        "db": "CERT/CC",
        "id": "VU#704110"
      },
      {
        "db": "VULHUB",
        "id": "VHN-9253"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000366"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200409-014"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0823"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "OpenLDAP 1.0 through 2.1.19, as used in Apple Mac OS 10.3.4 and 10.3.5 and possibly other operating systems, may allow certain authentication schemes to use hashed (crypt) passwords in the userPassword attribute as if they were plaintext passwords, which allows remote attackers to re-use hashed passwords without decrypting them. There is a vulnerability in the Apple QuickTime Streaming Server that could allow a remote attacker to cause a denial-of-service condition. There is a vulnerability in the Mac OS X CoreFoundation framework that could allow a local attacker to execute arbitrary code. OpenLDAP In using a specific authentication scheme userPassword There is a flaw that prevents password authentication if the password value is obtained because the value stored in is not processed as plain text.Password authentication may be avoided. In certain undisclosed cases, OpenLDAP is reported prone to an ambiguous-password-attribute weakness. \nIf an attacker can retrieve a password hash as contained in the OpenLDAP database, they may then be able to directly authenticate to the LDAP database. The attacker may gain unauthorized access if they can sniff password hashes from the network or if they can retrieve the contents of the \u0027userPassword\u0027 attribute from a database backup or through weak permissions on the database. \nThe OpenLDAP that is included with Apple Mac OS X, versions 10.3.4 and 10.3.5, is reported affected. Versions of OpenLDAP included in other operating systems may also be affected. There is a problem in OpenLDAP\u0027s verification of CRYPT passwords. Remote attackers can use this vulnerability to log in using other users\u0027 CRYPT values \u200b\u200bas passwords. An attacker can log in with the target user\u0027s authority by using the CRYPT value of the target user\u0027s password. Apple reports that CRYPT passwords can be specified as a clear text password as userPassword. According to reports, some authentication mechanisms can use CRYPT values \u200b\u200bas plaintext passwords. \n\nTITLE:\nRed Hat update for openldap / nss_ldap\n\nSECUNIA ADVISORY ID:\nSA17233\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/17233/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nSecurity Bypass, Exposure of sensitive information\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nRedHat Linux Advanced Workstation 2.1 for Itanium\nhttp://secunia.com/product/1326/\nRedHat Enterprise Linux WS 4\nhttp://secunia.com/product/4670/\nRedHat Enterprise Linux WS 3\nhttp://secunia.com/product/2536/\nRedHat Enterprise Linux WS 2.1\nhttp://secunia.com/product/1044/\nRedHat Enterprise Linux ES 4\nhttp://secunia.com/product/4668/\nRedHat Enterprise Linux ES 3\nhttp://secunia.com/product/2535/\nRedHat Enterprise Linux ES 2.1\nhttp://secunia.com/product/1306/\nRedHat Enterprise Linux AS 4\nhttp://secunia.com/product/4669/\nRedHat Enterprise Linux AS 3\nhttp://secunia.com/product/2534/\nRedHat Enterprise Linux AS 2.1\nhttp://secunia.com/product/48/\n\nDESCRIPTION:\nRed Hat has issued updates for openldap / nss_ldap. This fixes two\nsecurity issues and a vulnerability, which can be exploit by\nmalicious people to gain knowledge of sensitive information or bypass\ncertain security restrictions. \n\nFor more information:\nSA15906\nSA16518\nSA12491\n\nSOLUTION:\nUpdated packages are available from Red Hat Network. \nhttp://rhn.redhat.com/\n\nORIGINAL ADVISORY:\nhttp://rhn.redhat.com/errata/RHSA-2005-767.html\nhttp://rhn.redhat.com/errata/RHSA-2005-751.html\n\nOTHER REFERENCES:\nSA15906:\nhttp://secunia.com/advisories/15906/\n\nSA16518:\nhttp://secunia.com/advisories/16518/\n\nSA12491:\nhttp://secunia.com/advisories/12491/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2004-0823"
      },
      {
        "db": "CERT/CC",
        "id": "VU#914870"
      },
      {
        "db": "CERT/CC",
        "id": "VU#545446"
      },
      {
        "db": "CERT/CC",
        "id": "VU#704110"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000366"
      },
      {
        "db": "BID",
        "id": "11137"
      },
      {
        "db": "VULHUB",
        "id": "VHN-9253"
      },
      {
        "db": "PACKETSTORM",
        "id": "40749"
      }
    ],
    "trust": 4.23
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "SECUNIA",
        "id": "12491",
        "trust": 4.1
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0823",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "11137",
        "trust": 2.8
      },
      {
        "db": "SECUNIA",
        "id": "17233",
        "trust": 1.8
      },
      {
        "db": "SECUNIA",
        "id": "21520",
        "trust": 1.7
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2004.0559",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1011174",
        "trust": 1.6
      },
      {
        "db": "BID",
        "id": "11138",
        "trust": 0.8
      },
      {
        "db": "SECTRACK",
        "id": "1011176",
        "trust": 0.8
      },
      {
        "db": "CERT/CC",
        "id": "VU#914870",
        "trust": 0.8
      },
      {
        "db": "CERT/CC",
        "id": "VU#545446",
        "trust": 0.8
      },
      {
        "db": "CERT/CC",
        "id": "VU#704110",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000366",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200409-014",
        "trust": 0.7
      },
      {
        "db": "APPLE",
        "id": "APPLE-SA-2004-09-07",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "17300",
        "trust": 0.6
      },
      {
        "db": "REDHAT",
        "id": "RHSA-2005:751",
        "trust": 0.6
      },
      {
        "db": "OVAL",
        "id": "OVAL:ORG.MITRE.OVAL:DEF:10703",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-9253",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "40749",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#914870"
      },
      {
        "db": "CERT/CC",
        "id": "VU#545446"
      },
      {
        "db": "CERT/CC",
        "id": "VU#704110"
      },
      {
        "db": "VULHUB",
        "id": "VHN-9253"
      },
      {
        "db": "BID",
        "id": "11137"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000366"
      },
      {
        "db": "PACKETSTORM",
        "id": "40749"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200409-014"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0823"
      }
    ]
  },
  "id": "VAR-200409-0015",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-9253"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-08-14T12:19:51.775000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "RHSA-2005:751",
        "trust": 0.8,
        "url": "https://rhn.redhat.com/errata/RHSA-2005-751.html"
      },
      {
        "title": "RHSA-2005:751",
        "trust": 0.8,
        "url": "http://www.jp.redhat.com/support/errata/RHSA/RHSA-2005-751J.html"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000366"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2004-0823"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 4.2,
        "url": "http://secunia.com/advisories/12491/"
      },
      {
        "trust": 2.5,
        "url": "http://www.securityfocus.com/bid/11137"
      },
      {
        "trust": 2.4,
        "url": "http://docs.info.apple.com/article.html?artnum=61798"
      },
      {
        "trust": 2.0,
        "url": "http://support.avaya.com/elmodocs2/security/asa-2006-157.htm"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/advisories/7148"
      },
      {
        "trust": 1.7,
        "url": "http://www.auscert.org.au/render.html?it=4363"
      },
      {
        "trust": 1.7,
        "url": "http://www.redhat.com/support/errata/rhsa-2005-751.html"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/17233"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/21520"
      },
      {
        "trust": 1.6,
        "url": "http://developer.apple.com/documentation/macosx/conceptual/systemoverview/systemarchitecture/chapter_3_section_7.html"
      },
      {
        "trust": 1.6,
        "url": "http://www.securitytracker.com/alerts/2004/sep/1011174.html"
      },
      {
        "trust": 1.1,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a10703"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17300"
      },
      {
        "trust": 0.8,
        "url": "http://www.securitytracker.com/alerts/2004/sep/1011176.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/bid/11138"
      },
      {
        "trust": 0.8,
        "url": "http://developer.apple.com/documentation/corefoundation/reference/cfpluginref/reference/introduction.html"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2004-0823"
      },
      {
        "trust": 0.8,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2004-0823"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/17300"
      },
      {
        "trust": 0.6,
        "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:10703"
      },
      {
        "trust": 0.3,
        "url": "http://www.openldap.org/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/17233/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/2536/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/2535/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/48/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/15906/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/4669/"
      },
      {
        "trust": 0.1,
        "url": "http://rhn.redhat.com/errata/rhsa-2005-751.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/16518/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/4668/"
      },
      {
        "trust": 0.1,
        "url": "http://rhn.redhat.com/errata/rhsa-2005-767.html"
      },
      {
        "trust": 0.1,
        "url": "http://rhn.redhat.com/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/1326/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/1306/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/4670/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/2534/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/1044/"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#914870"
      },
      {
        "db": "CERT/CC",
        "id": "VU#545446"
      },
      {
        "db": "CERT/CC",
        "id": "VU#704110"
      },
      {
        "db": "VULHUB",
        "id": "VHN-9253"
      },
      {
        "db": "BID",
        "id": "11137"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000366"
      },
      {
        "db": "PACKETSTORM",
        "id": "40749"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200409-014"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0823"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#914870"
      },
      {
        "db": "CERT/CC",
        "id": "VU#545446"
      },
      {
        "db": "CERT/CC",
        "id": "VU#704110"
      },
      {
        "db": "VULHUB",
        "id": "VHN-9253"
      },
      {
        "db": "BID",
        "id": "11137"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000366"
      },
      {
        "db": "PACKETSTORM",
        "id": "40749"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200409-014"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0823"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2004-09-13T00:00:00",
        "db": "CERT/CC",
        "id": "VU#914870"
      },
      {
        "date": "2004-09-09T00:00:00",
        "db": "CERT/CC",
        "id": "VU#545446"
      },
      {
        "date": "2004-09-09T00:00:00",
        "db": "CERT/CC",
        "id": "VU#704110"
      },
      {
        "date": "2004-09-07T00:00:00",
        "db": "VULHUB",
        "id": "VHN-9253"
      },
      {
        "date": "2004-09-07T00:00:00",
        "db": "BID",
        "id": "11137"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2004-000366"
      },
      {
        "date": "2005-10-18T22:10:31",
        "db": "PACKETSTORM",
        "id": "40749"
      },
      {
        "date": "2004-09-07T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200409-014"
      },
      {
        "date": "2004-09-07T04:00:00",
        "db": "NVD",
        "id": "CVE-2004-0823"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2004-09-15T00:00:00",
        "db": "CERT/CC",
        "id": "VU#914870"
      },
      {
        "date": "2004-09-29T00:00:00",
        "db": "CERT/CC",
        "id": "VU#545446"
      },
      {
        "date": "2004-09-09T00:00:00",
        "db": "CERT/CC",
        "id": "VU#704110"
      },
      {
        "date": "2017-10-11T00:00:00",
        "db": "VULHUB",
        "id": "VHN-9253"
      },
      {
        "date": "2006-08-16T21:45:00",
        "db": "BID",
        "id": "11137"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2004-000366"
      },
      {
        "date": "2005-10-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200409-014"
      },
      {
        "date": "2017-10-11T01:29:35.107000",
        "db": "NVD",
        "id": "CVE-2004-0823"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200409-014"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Apple QuickTime Streaming Server vulnerable to DoS",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#914870"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Design Error",
    "sources": [
      {
        "db": "BID",
        "id": "11137"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200409-014"
      }
    ],
    "trust": 0.9
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.