Vulnerability Description
The _expand_arg function in the pam_env module (modules/pam_env/pam_env.c) in Linux-PAM (aka pam) before 1.1.5 does not properly handle when environment variable expansion can overflow, which allows local users to cause a denial of service (CPU consumption).
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux-Pam | Linux-Pam | <= 1.1.4 |
Related Weaknesses (CWE)
References
- http://git.fedorahosted.org/git/?p=linux-pam.git%3Ba=commitdiff%3Bh=109823cb621c
- http://secunia.com/advisories/46583Vendor Advisory
- http://secunia.com/advisories/49711Vendor Advisory
- http://security.gentoo.org/glsa/glsa-201206-31.xml
- http://www.ubuntu.com/usn/USN-1237-1
- https://bugs.launchpad.net/ubuntu/+source/pam/+bug/874565
- http://git.fedorahosted.org/git/?p=linux-pam.git%3Ba=commitdiff%3Bh=109823cb621c
- http://secunia.com/advisories/46583Vendor Advisory
- http://secunia.com/advisories/49711Vendor Advisory
- http://security.gentoo.org/glsa/glsa-201206-31.xml
- http://www.ubuntu.com/usn/USN-1237-1
- https://bugs.launchpad.net/ubuntu/+source/pam/+bug/874565
FAQ
What is CVE-2011-3149?
CVE-2011-3149 is a vulnerability with a CVSS score of 2.1 (LOW). The _expand_arg function in the pam_env module (modules/pam_env/pam_env.c) in Linux-PAM (aka pam) before 1.1.5 does not properly handle when environment variable expansion can overflow, which allows l...
How severe is CVE-2011-3149?
CVE-2011-3149 has been rated LOW with a CVSS base score of 2.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-3149?
Check the references section above for vendor advisories and patch information. Affected products include: Linux-Pam Linux-Pam.