[21592] in bugtraq
Re: CERT Advisory CA-2001-18
daemon@ATHENA.MIT.EDU (Lupe Christoph)
Wed Jul 18 10:39:29 2001
Date: Wed, 18 Jul 2001 08:57:16 +0200
From: Lupe Christoph <lupe@lupe-christoph.de>
To: bugtraq@securityfocus.com
Message-ID: <20010718085716.R882@alanya.lupe-christoph.de>
Mail-Followup-To: Lupe Christoph <lupe@alanya.lupe-christoph.de>,
bugtraq@securityfocus.com
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <20010717085523.I9567@securityfocus.com>; from aleph1@securityfocus.com on Tue, Jul 17, 2001 at 08:55:23AM -0600
> CERT Advisory CA-2001-18 Multiple Vulnerabilities in Several
> Implementations of the Lightweight Directory Access Protocol (LDAP)
> Systems Affected
> * iPlanet Directory Server, version 5.0 Beta and versions up to and
> including 4.13
> * Certain versions of IBM SecureWay running under Solaris and
> Windows 2000
> * Lotus Domino R5 Servers (Enterprise, Application, and Mail),
> prior
> to 5.0.7a
> * Teamware Office for Windows NT and Solaris, prior to version
> 5.3ed1
> * Qualcomm Eudora WorldMail for Windows NT, version 2
> * Microsoft Exchange 5.5 LDAP Service (Hotfix pending)
> * Network Associates PGP Keyserver 7.0, prior to Hotfix 2
> * Oracle 8i Enterprise Edition
> * OpenLDAP, 1.x prior to 1.2.12 and 2.x prior to 2.0.8
Can anybody confirm that Novell Directory Service (NDS) is indeed
not vulnerable?
Thanks,
Lupe Christoph
--
| lupe@lupe-christoph.de | http://free.prohosting.com/~lupe |
| I have challenged the entire ISO-9000 quality assurance team to a |
| Bat-Leth contest on the holodeck. They will not concern us again. |
| http://public.logica.com/~stepneys/joke/klingon.htm |