Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2011-3149

Опубликовано: 22 июл. 2012
Источник: debian
EPSS Низкий

Описание

The _expand_arg function in the pam_env module (modules/pam_env/pam_env.c) in Linux-PAM (aka pam) before 1.1.5 does not properly handle when environment variable expansion can overflow, which allows local users to cause a denial of service (CPU consumption).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
pamfixed1.1.3-5package
pamnot-affectedlennypackage

EPSS

Процентиль: 19%
0.00062
Низкий

Связанные уязвимости

ubuntu
около 13 лет назад

The _expand_arg function in the pam_env module (modules/pam_env/pam_env.c) in Linux-PAM (aka pam) before 1.1.5 does not properly handle when environment variable expansion can overflow, which allows local users to cause a denial of service (CPU consumption).

redhat
почти 14 лет назад

The _expand_arg function in the pam_env module (modules/pam_env/pam_env.c) in Linux-PAM (aka pam) before 1.1.5 does not properly handle when environment variable expansion can overflow, which allows local users to cause a denial of service (CPU consumption).

nvd
около 13 лет назад

The _expand_arg function in the pam_env module (modules/pam_env/pam_env.c) in Linux-PAM (aka pam) before 1.1.5 does not properly handle when environment variable expansion can overflow, which allows local users to cause a denial of service (CPU consumption).

github
больше 3 лет назад

The _expand_arg function in the pam_env module (modules/pam_env/pam_env.c) in Linux-PAM (aka pam) before 1.1.5 does not properly handle when environment variable expansion can overflow, which allows local users to cause a denial of service (CPU consumption).

oracle-oval
больше 12 лет назад

ELSA-2013-0521: pam security, bug fix, and enhancement update (MODERATE)

EPSS

Процентиль: 19%
0.00062
Низкий