lsh daemon (lshd) does not properly return from certain functions in (1) read_line.c, (2) channel_commands.c, or (3) client_keyexchange.c when long input is provided, which could allow remote malicious users to execute arbitrary code via a heap-based buffer overflow attack.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
gnu lsh 1.4.2 |
||
gnu lsh 1.4 |
||
gnu lsh 1.4.1 |