Stack-based Buffer Overflow in Linux-PAM by Linux
CVE-2011-3148

Currently unrated

Key Information:

Vendor

Linux-pam

Status
Vendor
CVE Published:
22 July 2012

What is CVE-2011-3148?

The vulnerability in Linux-PAM arises from a stack-based buffer overflow in the _assemble_line function within the modules/pam_env/pam_env.c file. Local users can exploit this vulnerability by manipulating the ~/.pam_environment file with a lengthy string of white spaces, leading to a denial of service which may potentially allow the execution of arbitrary code. This issue affects Linux-PAM versions prior to 1.1.5 and poses a significant risk to systems utilizing this authentication module.

References

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.