CVE-2011-3148

Stack-based buffer overflow in the _assemble_line function in modules/pam_env/pam_env.c in Linux-PAM (aka pam) before 1.1.5 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long string of white spaces at the beginning of the ~/.pam_environment file.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:linux-pam:linux-pam:*:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.1.0:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.2.0:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.2.1:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.3.0:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.4.0:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.5.0:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.6.0:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.6.1:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.6.2:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.6.3:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.7.0:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.7.1:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.8.0:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.8.1:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.9.0:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.10.0:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:1.1.3:*:*:*:*:*:*:*

History

21 Nov 2024, 01:29

Type Values Removed Values Added
References () http://git.fedorahosted.org/git/?p=linux-pam.git%3Ba=commitdiff%3Bh=caf5e7f61c8d9288daa49b4f61962e6b1239121d - () http://git.fedorahosted.org/git/?p=linux-pam.git%3Ba=commitdiff%3Bh=caf5e7f61c8d9288daa49b4f61962e6b1239121d -
References () http://secunia.com/advisories/46583 - Vendor Advisory () http://secunia.com/advisories/46583 - Vendor Advisory
References () http://secunia.com/advisories/49711 - Vendor Advisory () http://secunia.com/advisories/49711 - Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-201206-31.xml - () http://security.gentoo.org/glsa/glsa-201206-31.xml -
References () http://www.ubuntu.com/usn/USN-1237-1 - () http://www.ubuntu.com/usn/USN-1237-1 -
References () https://bugs.launchpad.net/ubuntu/+source/pam/+bug/874469 - () https://bugs.launchpad.net/ubuntu/+source/pam/+bug/874469 -

07 Nov 2023, 02:08

Type Values Removed Values Added
References
  • {'url': 'http://git.fedorahosted.org/git/?p=linux-pam.git;a=commitdiff;h=caf5e7f61c8d9288daa49b4f61962e6b1239121d', 'name': 'http://git.fedorahosted.org/git/?p=linux-pam.git;a=commitdiff;h=caf5e7f61c8d9288daa49b4f61962e6b1239121d', 'tags': ['Exploit', 'Patch'], 'refsource': 'CONFIRM'}
  • () http://git.fedorahosted.org/git/?p=linux-pam.git%3Ba=commitdiff%3Bh=caf5e7f61c8d9288daa49b4f61962e6b1239121d -

Information

Published : 2012-07-22 17:55

Updated : 2024-11-21 01:29


NVD link : CVE-2011-3148

Mitre link : CVE-2011-3148

CVE.ORG link : CVE-2011-3148


JSON object : View

Products Affected

linux-pam

  • linux-pam
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer