CVE-2003-0174

The LDAP name service (nsd) in IRIX 6.5.19 and earlier does not properly verify if the USERPASSWORD attribute has been provided by an LDAP server, which could allow attackers to log in without a password.
References
Link Resource
ftp://patches.sgi.com/support/free/security/advisories/20030407-01-P Broken Link Patch Vendor Advisory
http://www.ciac.org/ciac/bulletins/n-084.shtml Broken Link
http://www.securityfocus.com/bid/7442 Broken Link Patch Third Party Advisory VDB Entry Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/11860 Third Party Advisory VDB Entry
ftp://patches.sgi.com/support/free/security/advisories/20030407-01-P Broken Link Patch Vendor Advisory
http://www.ciac.org/ciac/bulletins/n-084.shtml Broken Link
http://www.securityfocus.com/bid/7442 Broken Link Patch Third Party Advisory VDB Entry Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/11860 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*

History

20 Nov 2024, 23:44

Type Values Removed Values Added
References () ftp://patches.sgi.com/support/free/security/advisories/20030407-01-P - Broken Link, Patch, Vendor Advisory () ftp://patches.sgi.com/support/free/security/advisories/20030407-01-P - Broken Link, Patch, Vendor Advisory
References () http://www.ciac.org/ciac/bulletins/n-084.shtml - Broken Link () http://www.ciac.org/ciac/bulletins/n-084.shtml - Broken Link
References () http://www.securityfocus.com/bid/7442 - Broken Link, Patch, Third Party Advisory, VDB Entry, Vendor Advisory () http://www.securityfocus.com/bid/7442 - Broken Link, Patch, Third Party Advisory, VDB Entry, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/11860 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/11860 - Third Party Advisory, VDB Entry

08 Feb 2024, 20:45

Type Values Removed Values Added
CVSS v2 : 7.5
v3 : unknown
v2 : 7.5
v3 : 9.8
CWE NVD-CWE-Other CWE-346
CPE cpe:2.3:o:sgi:irix:6.5.5m:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.17f:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.16:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.8f:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.13f:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.4:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.14f:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.7m:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.8:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.3f:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.1:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.4m:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.12:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.11f:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.10f:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.18m:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.7f:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.15m:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.3m:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.10m:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.19:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.9f:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.11m:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.9:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.3:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.9m:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.18:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.8m:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.2:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.6:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.5f:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.15:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.16f:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.19f:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.16m:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.6f:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.14m:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.17m:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.4f:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.17:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.2m:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.14:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.15f:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.11:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.7:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.5:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.2f:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.10:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.6m:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.13m:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.18f:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.12f:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.13:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.12m:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.19m:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*
References (CIAC) http://www.ciac.org/ciac/bulletins/n-084.shtml - (CIAC) http://www.ciac.org/ciac/bulletins/n-084.shtml - Broken Link
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/11860 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/11860 - Third Party Advisory, VDB Entry
References (BID) http://www.securityfocus.com/bid/7442 - Patch, Vendor Advisory (BID) http://www.securityfocus.com/bid/7442 - Broken Link, Patch, Third Party Advisory, VDB Entry, Vendor Advisory
References (SGI) ftp://patches.sgi.com/support/free/security/advisories/20030407-01-P - Patch, Vendor Advisory (SGI) ftp://patches.sgi.com/support/free/security/advisories/20030407-01-P - Broken Link, Patch, Vendor Advisory

Information

Published : 2003-05-12 04:00

Updated : 2024-11-20 23:44


NVD link : CVE-2003-0174

Mitre link : CVE-2003-0174

CVE.ORG link : CVE-2003-0174


JSON object : View

Products Affected

sgi

  • irix
CWE
CWE-346

Origin Validation Error