CVE-2005-3567

slapd daemon in IBM Tivoli Directory Server (ITDS) 5.2.0 and 6.0.0 binds using SASL EXTERNAL, which allows attackers to bypass authentication and modify and delete directory data via unknown attack vectors.
References
Link Resource
http://secunia.com/advisories/17484 Patch Vendor Advisory
http://securitytracker.com/id?1015171 Patch
http://www-1.ibm.com/support/docview.wss?rs=767&context=SSVJJU&dc=D400&uid=swg24010819&loc=en_US&cs=UTF-8&lang=en Patch Vendor Advisory
http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVAIX53SECUR081510_247
http://www-1.ibm.com/support/docview.wss?uid=swg21222159 Patch Vendor Advisory
http://www-1.ibm.com/support/search.wss?rs=0&q=IO02697&apar=only
http://www-1.ibm.com/support/search.wss?rs=0&q=IO02714&apar=only
http://www.kb.cert.org/vuls/id/194753 US Government Resource
http://www.osvdb.org/20672 Patch
http://www.securityfocus.com/bid/15367 Patch
http://www.vupen.com/english/advisories/2005/2356 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/22989
http://secunia.com/advisories/17484 Patch Vendor Advisory
http://securitytracker.com/id?1015171 Patch
http://www-1.ibm.com/support/docview.wss?rs=767&context=SSVJJU&dc=D400&uid=swg24010819&loc=en_US&cs=UTF-8&lang=en Patch Vendor Advisory
http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVAIX53SECUR081510_247
http://www-1.ibm.com/support/docview.wss?uid=swg21222159 Patch Vendor Advisory
http://www-1.ibm.com/support/search.wss?rs=0&q=IO02697&apar=only
http://www-1.ibm.com/support/search.wss?rs=0&q=IO02714&apar=only
http://www.kb.cert.org/vuls/id/194753 US Government Resource
http://www.osvdb.org/20672 Patch
http://www.securityfocus.com/bid/15367 Patch
http://www.vupen.com/english/advisories/2005/2356 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/22989
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ibm:tivoli_directory_server:5.2.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:tivoli_directory_server:6.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:02

Type Values Removed Values Added
References () http://secunia.com/advisories/17484 - Patch, Vendor Advisory () http://secunia.com/advisories/17484 - Patch, Vendor Advisory
References () http://securitytracker.com/id?1015171 - Patch () http://securitytracker.com/id?1015171 - Patch
References () http://www-1.ibm.com/support/docview.wss?rs=767&context=SSVJJU&dc=D400&uid=swg24010819&loc=en_US&cs=UTF-8&lang=en - Patch, Vendor Advisory () http://www-1.ibm.com/support/docview.wss?rs=767&context=SSVJJU&dc=D400&uid=swg24010819&loc=en_US&cs=UTF-8&lang=en - Patch, Vendor Advisory
References () http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVAIX53SECUR081510_247 - () http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVAIX53SECUR081510_247 -
References () http://www-1.ibm.com/support/docview.wss?uid=swg21222159 - Patch, Vendor Advisory () http://www-1.ibm.com/support/docview.wss?uid=swg21222159 - Patch, Vendor Advisory
References () http://www-1.ibm.com/support/search.wss?rs=0&q=IO02697&apar=only - () http://www-1.ibm.com/support/search.wss?rs=0&q=IO02697&apar=only -
References () http://www-1.ibm.com/support/search.wss?rs=0&q=IO02714&apar=only - () http://www-1.ibm.com/support/search.wss?rs=0&q=IO02714&apar=only -
References () http://www.kb.cert.org/vuls/id/194753 - US Government Resource () http://www.kb.cert.org/vuls/id/194753 - US Government Resource
References () http://www.osvdb.org/20672 - Patch () http://www.osvdb.org/20672 - Patch
References () http://www.securityfocus.com/bid/15367 - Patch () http://www.securityfocus.com/bid/15367 - Patch
References () http://www.vupen.com/english/advisories/2005/2356 - Vendor Advisory () http://www.vupen.com/english/advisories/2005/2356 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/22989 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/22989 -

Information

Published : 2005-11-16 07:42

Updated : 2024-11-21 00:02


NVD link : CVE-2005-3567

Mitre link : CVE-2005-3567

CVE.ORG link : CVE-2005-3567


JSON object : View

Products Affected

ibm

  • tivoli_directory_server
CWE
CWE-264

Permissions, Privileges, and Access Controls