#VU43802 Stack-based buffer overflow in linux-pam - CVE-2011-3148
Published: July 22, 2012 / Updated: May 9, 2023
linux-pam
git.kernel.org
Description
The vulnerability allows a local user to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the _assemble_line() function in modules/pam_env/pam_env.c when processing a long string of white spaces at the beginning of the ~/.pam_environment file. A local user can trigger a stack-based buffer overflow and execute arbitrary code on the target system.
Remediation
External links
- http://git.fedorahosted.org/git/?p=linux-pam.git;a=commitdiff;h=caf5e7f61c8d9288daa49b4f61962e6b1239121d
- http://secunia.com/advisories/46583
- http://secunia.com/advisories/49711
- http://security.gentoo.org/glsa/glsa-201206-31.xml
- http://www.ubuntu.com/usn/USN-1237-1
- https://bugs.launchpad.net/ubuntu/+source/pam/+bug/874469