Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2011-3149

Overview

Vulnerability Score 2.1 2.1
CVE Id CVE-2011-3149
Last Modified 05 Mar 2014 11:31:36
Published 22 Jul 2012 01:55:01
Confidentiality Impact NONE NONE
Integrity Impact NONE NONE
Availability Impact PARTIAL PARTIAL
Access Vector LOCAL
Access Complexity LOW
Authentication NONE

CVE-2011-3149

Summary

The _expand_arg function in the pam_env module (modules/pam_env/pam_env.c) in Linux-PAM (aka pam) before 1.1.5 does not properly handle when environment variable expansion can overflow, which allows local users to cause a denial of service (CPU consumption).

Vulnerable Systems

Application

  • Kernel Linux-pam 0.99.1.0

  • Kernel Linux-pam 0.99.10.0

  • Kernel Linux-pam 0.99.2.0

  • Kernel Linux-pam 0.99.2.1

  • Kernel Linux-pam 0.99.3.0

  • Kernel Linux-pam 0.99.4.0

  • Kernel Linux-pam 0.99.5.0

  • Kernel Linux-pam 0.99.6.0

  • Kernel Linux-pam 0.99.6.1

  • Kernel Linux-pam 0.99.6.2

  • Kernel Linux-pam 0.99.6.3

  • Kernel Linux-pam 0.99.7.0

  • Kernel Linux-pam 0.99.7.1

  • Kernel Linux-pam 0.99.8.0

  • Kernel Linux-pam 0.99.8.1

  • Kernel Linux-pam 0.99.9.0

  • Kernel Linux-pam 1.0.0

  • Kernel Linux-pam 1.0.1

  • Kernel Linux-pam 1.0.2

  • Kernel Linux-pam 1.0.3

  • Kernel Linux-pam 1.0.4

  • Kernel Linux-pam 1.1.0

  • Kernel Linux-pam 1.1.1

  • Kernel Linux-pam 1.1.2

  • Kernel Linux-pam 1.1.3

  • Kernel Linux-pam 1.1.4


References

CONFIRM - https://bugs.launchpad.net/ubuntu/+source/pam/+bug/874565

GENTOO - GLSA-201206-31

SECUNIA - 49711

SECUNIA - 46583

CONFIRM - http://git.fedorahosted.org/git/?p=linux-pam.git;a=commitdiff;h=109823cb621c900c07c4b6cdc99070d354d19444

UBUNTU - USN-1237-1

Related Patches

Novell SUSE 2011:5342 pam security update for SLE 11 SP1 i586

Novell SUSE 2011:7814 pam security update for SLE 10 SP4 i586


Last Updated: 27 May 2016 10:54:56