Vulnerability Note VU#624713

IBM AIX "secldapclntd" daemon authentication vulnerability

Original Release date: 02 Apr 2003 | Last revised: 17 Apr 2003

Overview

A vulnerability in the secldapclntd daemon in IBM's AIX operating system could allow unauthorized remote users to modify accounts on the system.

Description

According to the IBM bulletin for this issue:

    "The secldapclntd daemon accepts requests from the LDAP load module, forwards requests to the LDAP server, and passes results from the server back to the LDAP loadmodule. The secldapclntd daemon uses an internet socket to communicate with the loadmodule. A remote user can craft a message to communicate with the daemon and gain unauthorized access to data or could potentially modify user accounts on the LDAP server."

This exposes a vulnerability in environments that use an LDAP (Lightweight Directory Access Protocol) database for user authentication.

Impact

A remote attacker can gain unauthorized access to data or modify user accounts on the system. It is unclear whether this vulnerability can be leveraged to gain root or other system-level access to the affected systems.

Solution

Apply a patch from the vendor

IBM has released patches to address this vulnerability; please see the vendor section of this document for further details.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
IBMAffected10 Mar 200324 Mar 2003
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

This issue was discovered by Tom Lu of IBM's AIX Security Team.

This document was written by Chad R Dougherty.

Other Information

  • CVE IDs: CAN-2003-0119
  • Date Public: 21 Feb 2003
  • Date First Published: 02 Apr 2003
  • Date Last Updated: 17 Apr 2003
  • Severity Metric: 15.82
  • Document Revision: 7

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.