Vulnerability Details : CVE-2003-0826
lsh daemon (lshd) does not properly return from certain functions in (1) read_line.c, (2) channel_commands.c, or (3) client_keyexchange.c when long input is provided, which could allow remote attackers to execute arbitrary code via a heap-based buffer overflow attack.
Vulnerability category: OverflowExecute code
Products affected by CVE-2003-0826
- cpe:2.3:a:gnu:lsh:1.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:lsh:1.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:lsh:1.4.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2003-0826
6.33%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 93 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2003-0826
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2003-0826
-
http://bugs.debian.org/211662
#211662 - lsh-server: heap overrun, possible remote root exploit - Debian Bug report logs
-
http://marc.info/?l=bugtraq&m=106398939512178&w=2
'Remote root vuln in lsh 1.4.x' - MARC
-
http://marc.info/?l=bugtraq&m=106407188509874&w=2
'LSH: Buffer overrun and remote root compromise in lshd' - MARC
-
http://www.debian.org/security/2005/dsa-717
[SECURITY] [DSA 717-1] New lsh packages fix several vulnerabilities
-
http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/010496.html
[Full-Disclosure] Mailing List Charter
-
http://lists.lysator.liu.se/pipermail/lsh-bugs/2003q3/000120.html
404 Not Found
Jump to