Vulnerability Description
Stack-based buffer overflow in the _assemble_line function in modules/pam_env/pam_env.c in Linux-PAM (aka pam) before 1.1.5 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long string of white spaces at the beginning of the ~/.pam_environment file.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux-Pam | Linux-Pam | <= 1.1.4 |
Related Weaknesses (CWE)
References
- http://git.fedorahosted.org/git/?p=linux-pam.git%3Ba=commitdiff%3Bh=caf5e7f61c8d
- http://secunia.com/advisories/46583Vendor Advisory
- http://secunia.com/advisories/49711Vendor Advisory
- http://security.gentoo.org/glsa/glsa-201206-31.xml
- http://www.ubuntu.com/usn/USN-1237-1
- https://bugs.launchpad.net/ubuntu/+source/pam/+bug/874469
- http://git.fedorahosted.org/git/?p=linux-pam.git%3Ba=commitdiff%3Bh=caf5e7f61c8d
- http://secunia.com/advisories/46583Vendor Advisory
- http://secunia.com/advisories/49711Vendor Advisory
- http://security.gentoo.org/glsa/glsa-201206-31.xml
- http://www.ubuntu.com/usn/USN-1237-1
- https://bugs.launchpad.net/ubuntu/+source/pam/+bug/874469
FAQ
What is CVE-2011-3148?
CVE-2011-3148 is a vulnerability with a CVSS score of 4.6 (MEDIUM). Stack-based buffer overflow in the _assemble_line function in modules/pam_env/pam_env.c in Linux-PAM (aka pam) before 1.1.5 allows local users to cause a denial of service (crash) and possibly execute...
How severe is CVE-2011-3148?
CVE-2011-3148 has been rated MEDIUM with a CVSS base score of 4.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-3148?
Check the references section above for vendor advisories and patch information. Affected products include: Linux-Pam Linux-Pam.