[21592] in bugtraq

home help back first fref pref prev next nref lref last post

Re: CERT Advisory CA-2001-18

daemon@ATHENA.MIT.EDU (Lupe Christoph)
Wed Jul 18 10:39:29 2001

Date: Wed, 18 Jul 2001 08:57:16 +0200
From: Lupe Christoph <lupe@lupe-christoph.de>
To: bugtraq@securityfocus.com
Message-ID: <20010718085716.R882@alanya.lupe-christoph.de>
Mail-Followup-To: Lupe Christoph <lupe@alanya.lupe-christoph.de>,
	bugtraq@securityfocus.com
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <20010717085523.I9567@securityfocus.com>; from aleph1@securityfocus.com on Tue, Jul 17, 2001 at 08:55:23AM -0600

> CERT Advisory CA-2001-18 Multiple Vulnerabilities in Several
> Implementations of the Lightweight Directory Access Protocol (LDAP)

> Systems Affected

>      * iPlanet Directory Server, version 5.0 Beta and versions up to and
>        including 4.13
>      * Certain versions of IBM SecureWay running under Solaris and
>        Windows 2000
>      * Lotus Domino R5 Servers (Enterprise, Application, and Mail),
> prior
>        to 5.0.7a
>      * Teamware Office for Windows NT and Solaris, prior to version
>        5.3ed1
>      * Qualcomm Eudora WorldMail for Windows NT, version 2
>      * Microsoft Exchange 5.5 LDAP Service (Hotfix pending)
>      * Network Associates PGP Keyserver 7.0, prior to Hotfix 2
>      * Oracle 8i Enterprise Edition
>      * OpenLDAP, 1.x prior to 1.2.12 and 2.x prior to 2.0.8

Can anybody confirm that Novell Directory Service (NDS) is indeed
not vulnerable?

Thanks,
Lupe Christoph
-- 
| lupe@lupe-christoph.de       |        http://free.prohosting.com/~lupe |
| I have challenged the entire ISO-9000 quality assurance team to a      |
| Bat-Leth contest on the holodeck. They will not concern us again.      |
| http://public.logica.com/~stepneys/joke/klingon.htm                    |

home help back first fref pref prev next nref lref last post