CVE-2004-0823
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
07/09/2004
Last modified:
03/04/2025
Description
OpenLDAP 1.0 through 2.1.19, as used in Apple Mac OS 10.3.4 and 10.3.5 and possibly other operating systems, may allow certain authentication schemes to use hashed (crypt) passwords in the userPassword attribute as if they were plaintext passwords, which allows remote attackers to re-use hashed passwords without decrypting them.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:openldap:openldap:1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openldap:openldap:1.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openldap:openldap:1.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openldap:openldap:1.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openldap:openldap:1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openldap:openldap:1.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openldap:openldap:1.1.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openldap:openldap:1.1.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openldap:openldap:1.1.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openldap:openldap:1.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openldap:openldap:1.2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openldap:openldap:1.2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openldap:openldap:1.2.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openldap:openldap:1.2.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openldap:openldap:1.2.5:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/12491/
- http://secunia.com/advisories/17233
- http://secunia.com/advisories/21520
- http://support.avaya.com/elmodocs2/security/ASA-2006-157.htm
- http://www.auscert.org.au/render.html?it=4363
- http://www.redhat.com/support/errata/RHSA-2005-751.html
- http://www.securityfocus.com/advisories/7148
- http://www.securityfocus.com/bid/11137
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17300
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10703
- http://secunia.com/advisories/12491/
- http://secunia.com/advisories/17233
- http://secunia.com/advisories/21520
- http://support.avaya.com/elmodocs2/security/ASA-2006-157.htm
- http://www.auscert.org.au/render.html?it=4363
- http://www.redhat.com/support/errata/RHSA-2005-751.html
- http://www.securityfocus.com/advisories/7148
- http://www.securityfocus.com/bid/11137
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17300
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10703



