Unspecified vulnerability in Solaris 8 and 9 allows local users to obtain the LDAP Directory Server root Distinguished Name (rootDN) password when a privileged user (1) runs idsconfig; or "insecurely" runs LDAP2 commands with the -w option, including (2) ldapadd, (3) ldapdelete, (4) ldapmodify, (5) ldapmodrdn, and (6) ldapsearch.
Link | Tags |
---|---|
http://www.osvdb.org/24565 | vdb entry |
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102113-1 | vendor advisory |
http://secunia.com/advisories/19638 | third party advisory vendor advisory |
http://support.avaya.com/elmodocs2/security/ASA-2006-122.htm | |
http://www.osvdb.org/24563 | vdb entry |
http://www.osvdb.org/24568 | vdb entry |
http://www.osvdb.org/24567 | vdb entry |
http://www.vupen.com/english/advisories/2006/1334 | vdb entry |
http://www.securityfocus.com/bid/17479 | vdb entry |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1840 | vdb entry signature |
http://securitytracker.com/id?1015903 | vdb entry |
http://secunia.com/advisories/21493 | third party advisory |
http://www.osvdb.org/24566 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/25747 | vdb entry |
http://www.osvdb.org/24564 | vdb entry |