CVE-2006-5170

Summary

CVECVE-2006-5170
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2006-10-10 04:06:00 UTC
Updated2022-02-25 19:20:00 UTC
Descriptionpam_ldap in nss_ldap on Red Hat Enterprise Linux 4, Fedora Core 3 and earlier, and possibly other distributions does not return an error condition when an LDAP directory server responds with a PasswordPolicyResponse control response, which causes the pam_authenticate function to return a success code even if authentication has failed, as originally reported for xscreensaver.

Risk And Classification

Problem Types: CWE-755

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Operating System Debian Debian Linux 3.1 All All All
Operating System Fedoraproject Fedora Core All All All All
Operating System Redhat Enterprise Linux 4.0 All All All
Operating System Redhat Enterprise Linux 4.0 All linux_kernel_2.6.9 All
Operating System Redhat Enterprise Linux 4.0 All linux_kernel_2.6.9 All
Operating System Redhat Enterprise Linux Desktop 4.0 All All All
Operating System Redhat Enterprise Linux For Ibm Z Systems 4.0_s390 All All All
Operating System Redhat Enterprise Linux For Ibm Z Systems 4.0_s390x All All All
Operating System Redhat Enterprise Linux For Power Big Endian 4.0 All All All
Operating System Redhat Enterprise Linux Server 4.0 All All All
Operating System Redhat Enterprise Linux Workstation 4.0 All All All
Operating System Redhat Fedora Core All All All All

References

ReferenceSourceLinkTags
Debian -- Security Information -- DSA-1203-1 libpam-ldap DEBIAN www.debian.org
nss_ldap Error in pam_ldap in Processing PasswordPolicyReponse Messages May Let Remote Users Bypass Authentication - SecurityTracker SECTRACK securitytracker.com
Security Announcement SUSE www.novell.com
SUSE Update for Multiple Packages - Advisories - Secunia SECUNIA secunia.com
Advisories - Mandriva Linux MANDRIVA www.mandriva.com
pam_ldap "PasswordPolicyResponse" Security Bypass - Secunia.com SECUNIA secunia.com
Red Hat update for nss_ldap - Advisories - Secunia SECUNIA secunia.com
PADL Software Pam_Ldap PasswordPolicyResponse Authentication Bypass Vulnerability BID www.securityfocus.com
Debian update for pam_ldap - Secunia.com SECUNIA secunia.com
Webmail : Solution de messagerie professionnelle - OVHcloud- OVH VUPEN www.vupen.com
207286 – CVE-2006-5170 When using LDAP for authentication, xscreensaver allows access if account locked out. CONFIRM bugzilla.redhat.com
Mandriva update for pam_ldap - Secunia.com SECUNIA secunia.com
pam_ldap: Authentication bypass vulnerability — Gentoo Linux Documentation GENTOO security.gentoo.org
2006-0061 TRUSTIX www.trustix.org
[#RPL-680] pam_ldap module in nss_ldap handles locked accounts incorrectly CVE-2006-5170 - rPath JIRA CONFIRM issues.rpath.com
Trustix Update for Multiple Packages - Advisories - Secunia SECUNIA secunia.com
bugzilla.padl.com/show_bug.cgi CONFIRM bugzilla.padl.com
Repository / Oval Repository OVAL oval.cisecurity.org
rhn.redhat.com | Red Hat Support REDHAT rhn.redhat.com
Gentoo update for pam_ldap - Advisories - Secunia SECUNIA secunia.com
SecurityFocus BUGTRAQ www.securityfocus.com
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report