{"vuid":"VU#624713","idnumber":"624713","name":"IBM AIX \"secldapclntd\" daemon authentication vulnerability","keywords":["IBM","AIX","secldapclntd daemon","crafted message","LDAP module","user accounts"],"overview":"A vulnerability in the secldapclntd daemon in IBM's AIX operating system could allow unauthorized remote users to modify accounts on the system.","clean_desc":"According to the IBM bulletin for this issue: \"The secldapclntd daemon accepts requests from the LDAP load module, forwards requests to the LDAP server, and passes results from the server back to the LDAP loadmodule. The secldapclntd daemon uses an internet socket to communicate with the loadmodule. A remote user can craft a message to communicate with the daemon and gain unauthorized access to data or could potentially modify user accounts on the LDAP server.\" This exposes a vulnerability in environments that use an LDAP (Lightweight Directory Access Protocol) database for user authentication.","impact":"A remote attacker can gain unauthorized access to data or modify user accounts on the system. It is unclear whether this vulnerability can be leveraged to gain root or other system-level access to the affected systems.","resolution":"Apply a patch from the vendor IBM has released patches to address this vulnerability; please see the vendor section of this document for further details.","workarounds":"","sysaffected":"","thanks":"This issue was discovered by Tom Lu of IBM's AIX Security Team.","author":"This document was written by Chad R Dougherty.","public":["http://www-1.ibm.com/services/continuity/recover1.nsf/4699c03b46f2d4f68525678c006d45ae/85256a3400529a8685256cde0008ddde?OpenDocument","http://www-1.ibm.com/support/docview.wss?uid=isg1IY40157","http://securitytracker.com/alerts/2003/Mar/1006192.html","http://www.ietf.org/rfc/rfc3377.txt"],"cveids":["CVE-2003-0119"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2003-03-10T21:49:22Z","publicdate":"2003-02-21T00:00:00Z","datefirstpublished":"2003-04-02T22:11:03Z","dateupdated":"2003-04-17T18:06:11Z","revision":7,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"15","cam_impact":"15","cam_easeofexploitation":"15","cam_attackeraccessrequired":"10","cam_scorecurrent":"15.8203125","cam_scorecurrentwidelyknown":"18.984375","cam_scorecurrentwidelyknownexploited":"31.640625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":15.8203125,"vulnote":null}