7.5
CVSSv2

CVE-2003-0826

Published: 06/10/2003 Updated: 18/10/2016
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 760
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

lsh daemon (lshd) does not properly return from certain functions in (1) read_line.c, (2) channel_commands.c, or (3) client_keyexchange.c when long input is provided, which could allow remote malicious users to execute arbitrary code via a heap-based buffer overflow attack.

Vulnerable Product Search on Vulmon Subscribe to Product

gnu lsh 1.4.2

gnu lsh 1.4

gnu lsh 1.4.1

Exploits

source: wwwsecurityfocuscom/bid/8655/info lsh has been reported prone to a remote buffer overflow vulnerability The condition is reported to present itself in fairly restrictive circumstances, and has been reported to be exploitable pre-authentication Successful exploitation could result in the execution of arbitrary attacker supplied i ...
source: wwwsecurityfocuscom/bid/8655/info lsh has been reported prone to a remote buffer overflow vulnerability The condition is reported to present itself in fairly restrictive circumstances, and has been reported to be exploitable pre-authentication Successful exploitation could result in the execution of arbitrary attacker supplied ...