{"api_version":"1","generated_at":"2026-04-22T17:45:56+00:00","cve":"CVE-2006-5170","urls":{"html":"https://cve.report/CVE-2006-5170","api":"https://cve.report/api/cve/CVE-2006-5170.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2006-5170","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2006-5170"},"summary":{"title":"CVE-2006-5170","description":"pam_ldap in nss_ldap on Red Hat Enterprise Linux 4, Fedora Core 3 and earlier, and possibly other distributions does not return an error condition when an LDAP directory server responds with a PasswordPolicyResponse control response, which causes the pam_authenticate function to return a success code even if authentication has failed, as originally reported for xscreensaver.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2006-10-10 04:06:00","updated_at":"2022-02-25 19:20:00"},"problem_types":["CWE-755"],"metrics":[],"references":[{"url":"http://www.debian.org/security/2006/dsa-1203","name":"DSA-1203","refsource":"DEBIAN","tags":[],"title":"Debian -- Security Information -- DSA-1203-1 libpam-ldap","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securitytracker.com/id?1017153","name":"1017153","refsource":"SECTRACK","tags":[],"title":"nss_ldap Error in pam_ldap in Processing PasswordPolicyReponse Messages May Let Remote Users Bypass Authentication - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.novell.com/linux/security/advisories/2006_27_sr.html","name":"SUSE-SR:2006:027","refsource":"SUSE","tags":[],"title":"Security Announcement","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://secunia.com/advisories/23132","name":"23132","refsource":"SECUNIA","tags":[],"title":"SUSE Update for Multiple Packages - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:201","name":"MDKSA-2006:201","refsource":"MANDRIVA","tags":[],"title":"Advisories - Mandriva Linux","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/22682","name":"22682","refsource":"SECUNIA","tags":[],"title":"pam_ldap \"PasswordPolicyResponse\" Security Bypass - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/22869","name":"22869","refsource":"SECUNIA","tags":[],"title":"Red Hat update for nss_ldap - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/20880","name":"20880","refsource":"BID","tags":[],"title":"PADL Software Pam_Ldap PasswordPolicyResponse Authentication Bypass Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://secunia.com/advisories/22694","name":"22694","refsource":"SECUNIA","tags":[],"title":"Debian update for pam_ldap - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/4319","name":"ADV-2006-4319","refsource":"VUPEN","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=207286","name":"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=207286","refsource":"CONFIRM","tags":[],"title":"207286 – CVE-2006-5170 When using LDAP for authentication, xscreensaver allows access if account locked out.","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/22696","name":"22696","refsource":"SECUNIA","tags":[],"title":"Mandriva update for pam_ldap - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://security.gentoo.org/glsa/glsa-200612-19.xml","name":"GLSA-200612-19","refsource":"GENTOO","tags":[],"title":"pam_ldap: Authentication bypass vulnerability — Gentoo Linux Documentation","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.trustix.org/errata/2006/0061/","name":"2006-0061","refsource":"TRUSTIX","tags":[],"title":"","mime":"text/plain","httpstatus":"-1","archivestatus":"200"},{"url":"https://issues.rpath.com/browse/RPL-680","name":"https://issues.rpath.com/browse/RPL-680","refsource":"CONFIRM","tags":[],"title":"[#RPL-680] pam_ldap module in nss_ldap handles locked accounts incorrectly CVE-2006-5170 - rPath JIRA","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://secunia.com/advisories/22685","name":"22685","refsource":"SECUNIA","tags":[],"title":"Trustix Update for Multiple Packages - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://bugzilla.padl.com/show_bug.cgi?id=291","name":"http://bugzilla.padl.com/show_bug.cgi?id=291","refsource":"CONFIRM","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"404"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10418","name":"oval:org.mitre.oval:def:10418","refsource":"OVAL","tags":[],"title":"Repository  /  Oval Repository","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2006-0719.html","name":"RHSA-2006:0719","refsource":"REDHAT","tags":[],"title":"rhn.redhat.com | Red Hat Support","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://secunia.com/advisories/23428","name":"23428","refsource":"SECUNIA","tags":[],"title":"Gentoo update for pam_ldap - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/447859/100/200/threaded","name":"20061005 rPSA-2006-0183-1 nss_ldap","refsource":"BUGTRAQ","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2006-5170","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-5170","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2006","cve_id":"5170","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"3.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5170","vulnerable":"1","versionEndIncluding":"core_3.0","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora_core","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5170","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5170","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"4.0","cpe7":"*","cpe8":"linux_kernel_2.6.9","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5170","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"4.0","cpe7":"*","cpe8":"linux_kernel_2.6.9","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5170","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux_desktop","cpe6":"4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5170","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux_for_ibm_z_systems","cpe6":"4.0_s390","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5170","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux_for_ibm_z_systems","cpe6":"4.0_s390x","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5170","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux_for_power_big_endian","cpe6":"4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5170","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux_server","cpe6":"4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5170","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux_workstation","cpe6":"4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5170","vulnerable":"1","versionEndIncluding":"core_3.0","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"fedora_core","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2006-5170","ASSIGNER":"secalert@redhat.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"pam_ldap in nss_ldap on Red Hat Enterprise Linux 4, Fedora Core 3 and earlier, and possibly other distributions does not return an error condition when an LDAP directory server responds with a PasswordPolicyResponse control response, which causes the pam_authenticate function to return a success code even if authentication has failed, as originally reported for xscreensaver."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_affected":"=","version_value":"n/a"}]}}]}}]}},"references":{"reference_data":[{"url":"http://bugzilla.padl.com/show_bug.cgi?id=291","refsource":"MISC","name":"http://bugzilla.padl.com/show_bug.cgi?id=291"},{"url":"http://rhn.redhat.com/errata/RHSA-2006-0719.html","refsource":"MISC","name":"http://rhn.redhat.com/errata/RHSA-2006-0719.html"},{"url":"http://secunia.com/advisories/22682","refsource":"MISC","name":"http://secunia.com/advisories/22682"},{"url":"http://secunia.com/advisories/22685","refsource":"MISC","name":"http://secunia.com/advisories/22685"},{"url":"http://secunia.com/advisories/22694","refsource":"MISC","name":"http://secunia.com/advisories/22694"},{"url":"http://secunia.com/advisories/22696","refsource":"MISC","name":"http://secunia.com/advisories/22696"},{"url":"http://secunia.com/advisories/22869","refsource":"MISC","name":"http://secunia.com/advisories/22869"},{"url":"http://secunia.com/advisories/23132","refsource":"MISC","name":"http://secunia.com/advisories/23132"},{"url":"http://secunia.com/advisories/23428","refsource":"MISC","name":"http://secunia.com/advisories/23428"},{"url":"http://security.gentoo.org/glsa/glsa-200612-19.xml","refsource":"MISC","name":"http://security.gentoo.org/glsa/glsa-200612-19.xml"},{"url":"http://securitytracker.com/id?1017153","refsource":"MISC","name":"http://securitytracker.com/id?1017153"},{"url":"http://www.debian.org/security/2006/dsa-1203","refsource":"MISC","name":"http://www.debian.org/security/2006/dsa-1203"},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:201","refsource":"MISC","name":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:201"},{"url":"http://www.novell.com/linux/security/advisories/2006_27_sr.html","refsource":"MISC","name":"http://www.novell.com/linux/security/advisories/2006_27_sr.html"},{"url":"http://www.securityfocus.com/archive/1/447859/100/200/threaded","refsource":"MISC","name":"http://www.securityfocus.com/archive/1/447859/100/200/threaded"},{"url":"http://www.securityfocus.com/bid/20880","refsource":"MISC","name":"http://www.securityfocus.com/bid/20880"},{"url":"http://www.trustix.org/errata/2006/0061/","refsource":"MISC","name":"http://www.trustix.org/errata/2006/0061/"},{"url":"http://www.vupen.com/english/advisories/2006/4319","refsource":"MISC","name":"http://www.vupen.com/english/advisories/2006/4319"},{"url":"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=207286","refsource":"MISC","name":"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=207286"},{"url":"https://issues.rpath.com/browse/RPL-680","refsource":"MISC","name":"https://issues.rpath.com/browse/RPL-680"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10418","refsource":"MISC","name":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10418"}]}},"nvd":{"publishedDate":"2006-10-10 04:06:00","lastModifiedDate":"2022-02-25 19:20:00","problem_types":["CWE-755"],"metrics":{"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":7.5},"severity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux:4.0:*:linux_kernel_2.6.9:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora_core:*:*:*:*:*:*:*:*","versionEndIncluding":"core_3.0","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:4.0_s390x:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:4.0_s390:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:4.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2006","CveId":"5170","Ordinal":"20512","Title":"CVE-2006-5170","CVE":"CVE-2006-5170","Year":"2006"},"notes":[{"CveYear":"2006","CveId":"5170","Ordinal":"1","NoteData":"pam_ldap in nss_ldap on Red Hat Enterprise Linux 4, Fedora Core 3 and earlier, and possibly other distributions does not return an error condition when an LDAP directory server responds with a PasswordPolicyResponse control response, which causes the pam_authenticate function to return a success code even if authentication has failed, as originally reported for xscreensaver.","Type":"Description","Title":null},{"CveYear":"2006","CveId":"5170","Ordinal":"2","NoteData":"2006-10-04","Type":"Other","Title":"Published"},{"CveYear":"2006","CveId":"5170","Ordinal":"3","NoteData":"2018-10-17","Type":"Other","Title":"Modified"}]}}}