Логотип exploitDog
bind:"CVE-2011-3148" OR bind:"CVE-2011-3149"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2011-3148" OR bind:"CVE-2011-3149"

Количество 24

Количество 24

nvd логотип

CVE-2011-3148

около 13 лет назад

Stack-based buffer overflow in the _assemble_line function in modules/pam_env/pam_env.c in Linux-PAM (aka pam) before 1.1.5 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long string of white spaces at the beginning of the ~/.pam_environment file.

CVSS2: 4.6
EPSS: Низкий
debian логотип

CVE-2011-3148

около 13 лет назад

Stack-based buffer overflow in the _assemble_line function in modules/ ...

CVSS2: 4.6
EPSS: Низкий
github логотип

GHSA-gh7c-55pq-pm8c

больше 3 лет назад

Stack-based buffer overflow in the _assemble_line function in modules/pam_env/pam_env.c in Linux-PAM (aka pam) before 1.1.5 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long string of white spaces at the beginning of the ~/.pam_environment file.

EPSS: Низкий
github логотип

GHSA-5wc7-486v-w943

больше 3 лет назад

The _expand_arg function in the pam_env module (modules/pam_env/pam_env.c) in Linux-PAM (aka pam) before 1.1.5 does not properly handle when environment variable expansion can overflow, which allows local users to cause a denial of service (CPU consumption).

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2011-3148

Stack-based buffer overflow in the _assemble_line function in modules/pam_env/pam_env.c in Linux-PAM (aka pam) before 1.1.5 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long string of white spaces at the beginning of the ~/.pam_environment file.

CVSS2: 4.6
0%
Низкий
около 13 лет назад
debian логотип
CVE-2011-3148

Stack-based buffer overflow in the _assemble_line function in modules/ ...

CVSS2: 4.6
0%
Низкий
около 13 лет назад
github логотип
GHSA-gh7c-55pq-pm8c

Stack-based buffer overflow in the _assemble_line function in modules/pam_env/pam_env.c in Linux-PAM (aka pam) before 1.1.5 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long string of white spaces at the beginning of the ~/.pam_environment file.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-5wc7-486v-w943

The _expand_arg function in the pam_env module (modules/pam_env/pam_env.c) in Linux-PAM (aka pam) before 1.1.5 does not properly handle when environment variable expansion can overflow, which allows local users to cause a denial of service (CPU consumption).

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу