CVE-2011-3149
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
22/07/2012
Last modified:
11/04/2025
Description
The _expand_arg function in the pam_env module (modules/pam_env/pam_env.c) in Linux-PAM (aka pam) before 1.1.5 does not properly handle when environment variable expansion can overflow, which allows local users to cause a denial of service (CPU consumption).
Impact
Base Score 2.0
2.10
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:linux-pam:linux-pam:*:*:*:*:*:*:*:* | 1.1.4 (including) | |
| cpe:2.3:a:linux-pam:linux-pam:0.99.1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:linux-pam:linux-pam:0.99.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:linux-pam:linux-pam:0.99.2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:linux-pam:linux-pam:0.99.3.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:linux-pam:linux-pam:0.99.4.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:linux-pam:linux-pam:0.99.5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:linux-pam:linux-pam:0.99.6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:linux-pam:linux-pam:0.99.6.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:linux-pam:linux-pam:0.99.6.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:linux-pam:linux-pam:0.99.6.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:linux-pam:linux-pam:0.99.7.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:linux-pam:linux-pam:0.99.7.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:linux-pam:linux-pam:0.99.8.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:linux-pam:linux-pam:0.99.8.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://git.fedorahosted.org/git/?p=linux-pam.git%3Ba%3Dcommitdiff%3Bh%3D109823cb621c900c07c4b6cdc99070d354d19444
- http://secunia.com/advisories/46583
- http://secunia.com/advisories/49711
- http://security.gentoo.org/glsa/glsa-201206-31.xml
- http://www.ubuntu.com/usn/USN-1237-1
- https://bugs.launchpad.net/ubuntu/+source/pam/+bug/874565
- http://git.fedorahosted.org/git/?p=linux-pam.git%3Ba%3Dcommitdiff%3Bh%3D109823cb621c900c07c4b6cdc99070d354d19444
- http://secunia.com/advisories/46583
- http://secunia.com/advisories/49711
- http://security.gentoo.org/glsa/glsa-201206-31.xml
- http://www.ubuntu.com/usn/USN-1237-1
- https://bugs.launchpad.net/ubuntu/+source/pam/+bug/874565



