Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2011-3148

Опубликовано: 24 окт. 2011
Источник: redhat
CVSS2: 3.7
EPSS Низкий

Описание

Stack-based buffer overflow in the _assemble_line function in modules/pam_env/pam_env.c in Linux-PAM (aka pam) before 1.1.5 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long string of white spaces at the beginning of the ~/.pam_environment file.

Отчет

This issue did not affect the versions of pam package as shipped with Red Hat Enterprise Linux 5.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 4pamNot affected
Red Hat Enterprise Linux 5pamNot affected
Red Hat Enterprise Linux 6pamFixedRHSA-2013:052120.02.2013

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-121
https://bugzilla.redhat.com/show_bug.cgi?id=746619(pam_env): Stack-based buffer overflow by parsing user's pam_environment file

EPSS

Процентиль: 37%
0.00158
Низкий

3.7 Low

CVSS2

Связанные уязвимости

ubuntu
около 13 лет назад

Stack-based buffer overflow in the _assemble_line function in modules/pam_env/pam_env.c in Linux-PAM (aka pam) before 1.1.5 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long string of white spaces at the beginning of the ~/.pam_environment file.

nvd
около 13 лет назад

Stack-based buffer overflow in the _assemble_line function in modules/pam_env/pam_env.c in Linux-PAM (aka pam) before 1.1.5 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long string of white spaces at the beginning of the ~/.pam_environment file.

debian
около 13 лет назад

Stack-based buffer overflow in the _assemble_line function in modules/ ...

github
больше 3 лет назад

Stack-based buffer overflow in the _assemble_line function in modules/pam_env/pam_env.c in Linux-PAM (aka pam) before 1.1.5 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long string of white spaces at the beginning of the ~/.pam_environment file.

oracle-oval
больше 12 лет назад

ELSA-2013-0521: pam security, bug fix, and enhancement update (MODERATE)

EPSS

Процентиль: 37%
0.00158
Низкий

3.7 Low

CVSS2