LDAP null base returns information
|ldap-nullbase (1425)||Low Risk|
If the Lightweight Directory Access Protocol (LDAP) allows a null base in an LDAP search, a user can submit a search that returns information on namingContexts and supported controls. An attacker could use this information to access directory listings and plan further attacks.
A naming context contains meta data about the directory server and the data managed by the server.
This event is an audit check and is not necessarily indicative of a vulnerability.
LDAP implementations are required to return some information as a result of a search. This information is required for LDAP clients to bind and interact with the directory.
When this event occurs, users can dump the base of the tree or issue a request without knowing the base object. LDAP implementations vary on how or whether it is possible or necessary to constrain or prevent null base requests. Some implementations use an access control list (ACL), others provide the ability using a utility program or user interface, and others may not be able to prevent these requests. Contact your vendor or refer to the documentation for more details on hardening specific LDAP implementations.
- Request for Comment document RFC 2251: Lightweight Directory Access Protocol (v3).
- Request for Comment document RFC 2820: Access Control Requirements for LDAP.
- Request for Comment document RFC 2829: Authentication Methods for LDAP.
- Apple Mac OS
- Cisco IOS
- Compaq Tru64
- Data General DG/UX
- HP HP-UX
- IBM AIX
- IBM OS2
- IETF LDAP
- Linux Kernel
- Microsoft Windows Vista
- Microsoft Windows 2000
- Microsoft Windows 2003 Server
- Microsoft Windows 7
- Microsoft Windows 8
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows 98SE
- Microsoft Windows Me
- Microsoft Windows NT 4.0
- Microsoft Windows Server 2008 R2
- Microsoft Windows Server 2008
- Microsoft Windows Server 2012
- Microsoft Windows XP
- Novell NetWare
- SCO SCO Unix
- SGI IRIX
- Sun Solaris
- Wind River BSDOS
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this