LDAP null base returns information

ldap-nullbase (1425) The risk level is classified as LowLow Risk


If the Lightweight Directory Access Protocol (LDAP) allows a null base in an LDAP search, a user can submit a search that returns information on namingContexts and supported controls. An attacker could use this information to access directory listings and plan further attacks.

A naming context contains meta data about the directory server and the data managed by the server.


Obtain Information


This event is an audit check and is not necessarily indicative of a vulnerability.

LDAP implementations are required to return some information as a result of a search. This information is required for LDAP clients to bind and interact with the directory.

When this event occurs, users can dump the base of the tree or issue a request without knowing the base object. LDAP implementations vary on how or whether it is possible or necessary to constrain or prevent null base requests. Some implementations use an access control list (ACL), others provide the ability using a utility program or user interface, and others may not be able to prevent these requests. Contact your vendor or refer to the documentation for more details on hardening specific LDAP implementations.


Platforms Affected:

  • Apple Mac OS
  • Cisco IOS
  • Compaq Tru64
  • Data General DG/UX
  • HP HP-UX
  • IBM OS2
  • Linux Kernel
  • Microsoft Windows Vista
  • Microsoft Windows 2000
  • Microsoft Windows 2003 Server
  • Microsoft Windows 7
  • Microsoft Windows 8
  • Microsoft Windows 95
  • Microsoft Windows 98
  • Microsoft Windows 98SE
  • Microsoft Windows Me
  • Microsoft Windows NT 4.0
  • Microsoft Windows Server 2008 R2
  • Microsoft Windows Server 2008
  • Microsoft Windows Server 2012
  • Microsoft Windows XP
  • Novell NetWare
  • SCO SCO Unix
  • Sun Solaris
  • Wind River BSDOS


Not available

The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this

Return to the main page