Vulnerability Note VU#624713
IBM AIX "secldapclntd" daemon authentication vulnerability
A vulnerability in the secldapclntd daemon in IBM's AIX operating system could allow unauthorized remote users to modify accounts on the system.
According to the IBM bulletin for this issue:
"The secldapclntd daemon accepts requests from the LDAP load module, forwards requests to the LDAP server, and passes results from the server back to the LDAP loadmodule. The secldapclntd daemon uses an internet socket to communicate with the loadmodule. A remote user can craft a message to communicate with the daemon and gain unauthorized access to data or could potentially modify user accounts on the LDAP server."
A remote attacker can gain unauthorized access to data or modify user accounts on the system. It is unclear whether this vulnerability can be leveraged to gain root or other system-level access to the affected systems.
Apply a patch from the vendor
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|IBM||Affected||10 Mar 2003||24 Mar 2003|
CVSS Metrics (Learn More)
This issue was discovered by Tom Lu of IBM's AIX Security Team.
This document was written by Chad R Dougherty.
- CVE IDs: CAN-2003-0119
- Date Public: 21 Feb 2003
- Date First Published: 02 Apr 2003
- Date Last Updated: 17 Apr 2003
- Severity Metric: 15.82
- Document Revision: 7
If you have feedback, comments, or additional information about this vulnerability, please send us email.