Lucene search

K
nvd[email protected]NVD:CVE-2011-3149
HistoryJul 22, 2012 - 5:55 p.m.

CVE-2011-3149

2012-07-2217:55:01
CWE-119
web.nvd.nist.gov

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:N/A:P

5.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

The _expand_arg function in the pam_env module (modules/pam_env/pam_env.c) in Linux-PAM (aka pam) before 1.1.5 does not properly handle when environment variable expansion can overflow, which allows local users to cause a denial of service (CPU consumption).

Affected configurations

NVD
Node
linux-pamlinux-pamRange1.1.4
OR
linux-pamlinux-pamMatch0.99.1.0
OR
linux-pamlinux-pamMatch0.99.2.0
OR
linux-pamlinux-pamMatch0.99.2.1
OR
linux-pamlinux-pamMatch0.99.3.0
OR
linux-pamlinux-pamMatch0.99.4.0
OR
linux-pamlinux-pamMatch0.99.5.0
OR
linux-pamlinux-pamMatch0.99.6.0
OR
linux-pamlinux-pamMatch0.99.6.1
OR
linux-pamlinux-pamMatch0.99.6.2
OR
linux-pamlinux-pamMatch0.99.6.3
OR
linux-pamlinux-pamMatch0.99.7.0
OR
linux-pamlinux-pamMatch0.99.7.1
OR
linux-pamlinux-pamMatch0.99.8.0
OR
linux-pamlinux-pamMatch0.99.8.1
OR
linux-pamlinux-pamMatch0.99.9.0
OR
linux-pamlinux-pamMatch0.99.10.0
OR
linux-pamlinux-pamMatch1.0.0
OR
linux-pamlinux-pamMatch1.0.1
OR
linux-pamlinux-pamMatch1.0.2
OR
linux-pamlinux-pamMatch1.0.3
OR
linux-pamlinux-pamMatch1.0.4
OR
linux-pamlinux-pamMatch1.1.0
OR
linux-pamlinux-pamMatch1.1.1
OR
linux-pamlinux-pamMatch1.1.2
OR
linux-pamlinux-pamMatch1.1.3

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:N/A:P

5.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%