On Tue, Mar 16, 2004 at 03:38:23AM -0600, Redmond Militante wrote: > Vulnerability > ldap (389/tcp) > > improperly configured LDAP servers will allow any user to connect to the > server and query for information. > > the solution was: Disable NULL BASE queries on your LDAP server
Does this really come from a single vulnerability report? The first sentence refers to a NULL BIND while the second explicitly states "NULL BASE"; these are independent problems. A NULL BIND means anyone can query your directory without authenticating to it first while a NULL BASE means people don't need to know anything about your directory structure to make queries. Neither problem is specific to a given implementation of an X.500 / LDAP directory. Instead, they generally arise because a directory was configured insecurely. > nessus also referenced the MS knowledge base link > at http://www.microsoft.com/technet/security/bulletin/ms99-009.mspx > > this vulnerability seems specific to MS Exchange prior to SP2. Not exactly. Nessus, at least in ldap_null_bind.nasl (plugin #10723), points to this as an *additional* vulnerability in the bind function in Exchange 5.5 prior to SP2. George -- [EMAIL PROTECTED]
pgp00000.pgp
Description: PGP signature
_______________________________________________ Nessus mailing list [EMAIL PROTECTED] http://mail.nessus.org/mailman/listinfo/nessus
