3.6
CVSSv2

CVE-2006-0353

Published: 22/01/2006 Updated: 20/07/2017
CVSS v2 Base Score: 3.6 | Impact Score: 4.9 | Exploitability Score: 3.9
VMScore: 320
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:P

Vulnerability Summary

unix_random.c in lshd for lsh 2.0.1 leaks file descriptors related to the randomness generator, which allows local users to cause a denial of service by truncating the seed file, which prevents the server from starting, or obtain sensitive seed information that could be used to crack keys.

Vulnerable Product Search on Vulmon Subscribe to Product

gnu lsh 2.0.1

Vendor Advisories

Debian Bug report logs - #349303 lsh-server: lshd leaks fd:s to user shells Package: lsh-server; Maintainer for lsh-server is Magnus Holmgren <holmgren@debianorg>; Source for lsh-server is src:lsh-utils (PTS, buildd, popcon) Reported by: Stefan Pfetzing <dreamind@dreamindde> Date: Sun, 22 Jan 2006 05:18:04 UTC Sev ...
Stefan Pfetzing discovered that lshd, a Secure Shell v2 (SSH2) protocol server, leaks a couple of file descriptors, related to the randomness generator, to user shells which are started by lshd A local attacker can truncate the server's seed file, which may prevent the server from starting, and with some more effort, maybe also crack session keys ...