Description
The LDAP server in Active Directory in Microsoft Windows 2000 SP4 and Server 2003 SP1 and SP2 responds differently to a failed bind attempt depending on whether the user account exists and is permitted to login, which allows remote attackers to enumerate valid usernames via a series of LDAP bind requests, as demonstrated by ldapuserenum.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Bernardo Damele · pythonremotewindows
https://www.exploit-db.com/exploits/32586
References (4)
Core 4
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/46628
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/32305
Various Sources x_refsource_misc
http://labs.portcullis.co.uk/application/ldapuserenum/
Various Sources x_refsource_misc
http://www.portcullis-security.com/294.php
Scores
EPSS
0.3645
EPSS Percentile
97.1%
Details
CWE
CWE-200
Status
published
Products (2)
microsoft/windows
server_2003 sp1 (2 CPE variants)
microsoft/windows_2000
Published
Nov 17, 2008
Tracked Since
Feb 18, 2026