CVE-2011-3148
22.07.2012, 17:55
Stack-based buffer overflow in the _assemble_line function in modules/pam_env/pam_env.c in Linux-PAM (aka pam) before 1.1.5 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long string of white spaces at the beginning of the ~/.pam_environment file.Enginsight
Vendor | Product | Version |
---|---|---|
linux-pam | linux-pam | 𝑥 ≤ 1.1.4 |
linux-pam | linux-pam | 0.99.1.0 |
linux-pam | linux-pam | 0.99.2.0 |
linux-pam | linux-pam | 0.99.2.1 |
linux-pam | linux-pam | 0.99.3.0 |
linux-pam | linux-pam | 0.99.4.0 |
linux-pam | linux-pam | 0.99.5.0 |
linux-pam | linux-pam | 0.99.6.0 |
linux-pam | linux-pam | 0.99.6.1 |
linux-pam | linux-pam | 0.99.6.2 |
linux-pam | linux-pam | 0.99.6.3 |
linux-pam | linux-pam | 0.99.7.0 |
linux-pam | linux-pam | 0.99.7.1 |
linux-pam | linux-pam | 0.99.8.0 |
linux-pam | linux-pam | 0.99.8.1 |
linux-pam | linux-pam | 0.99.9.0 |
linux-pam | linux-pam | 0.99.10.0 |
linux-pam | linux-pam | 1.0.0 |
linux-pam | linux-pam | 1.0.1 |
linux-pam | linux-pam | 1.0.2 |
linux-pam | linux-pam | 1.0.3 |
linux-pam | linux-pam | 1.0.4 |
linux-pam | linux-pam | 1.1.0 |
linux-pam | linux-pam | 1.1.1 |
linux-pam | linux-pam | 1.1.2 |
linux-pam | linux-pam | 1.1.3 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References