Vulnerability Note VU#194753

IBM Tivoli Directory Server may allow unauthorized access

Original Release date: 17 Nov 2005 | Last revised: 08 Dec 2005

Overview

IBM Tivoli Directory Server may allow unauthorized access to change, modify, and/or delete directory data under certain circumstances.

Description

The IBM Tivoli Directory Server product is described as:

    IBM Tivoli Directory Server provides a powerful Lightweight Directory Access Protocol (LDAP) identity infrastructure that is the foundation for deploying comprehensive identity management applications and advanced software architectures like Web services.


The Tivoli Directory Server may allow unauthorized access enabling attackers to manipulate directory data that they should not be able to access or change. Additional details about the underlying cause of the vulnerability are not available.

Impact

An attacker may be able to access, delete, modify, or change directory data.

Solution

Apply an update
Please reference the IBM Security Vulnerability note on this issue for information on updates, fixes, and workarounds.


Use SSL communication and authentication

Enabling SSL-only communication and SSL Client-Server authentication is believed to mitigate the flaw being exposed, although all customers are urged to apply the updates.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
IBM CorporationAffected03 Nov 200517 Nov 2005
IBM eServerUnknown17 Nov 200517 Nov 2005
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

Thanks to IBM for reporting this vulnerability.

This document was written by Ken MacInnis.

Other Information

  • CVE IDs: Unknown
  • Date Public: 09 Nov 2005
  • Date First Published: 17 Nov 2005
  • Date Last Updated: 08 Dec 2005
  • Severity Metric: 17.93
  • Document Revision: 10

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.