Vulnerability Details : CVE-2003-0826
lsh daemon (lshd) does not properly return from certain functions in (1) read_line.c, (2) channel_commands.c, or (3) client_keyexchange.c when long input is provided, which could allow remote attackers to execute arbitrary code via a heap-based buffer overflow attack.
Vulnerability category: OverflowExecute code
Exploit prediction scoring system (EPSS) score for CVE-2003-0826
Probability of exploitation activity in the next 30 days: 6.19%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 93 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2003-0826
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
[email protected] |
References for CVE-2003-0826
-
http://bugs.debian.org/211662
-
http://marc.info/?l=bugtraq&m=106398939512178&w=2
-
http://marc.info/?l=bugtraq&m=106407188509874&w=2
- http://www.debian.org/security/2005/dsa-717
-
http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/010496.html
-
http://lists.lysator.liu.se/pipermail/lsh-bugs/2003q3/000120.html
Products affected by CVE-2003-0826
- cpe:2.3:a:gnu:lsh:1.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:lsh:1.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:lsh:1.4.1:*:*:*:*:*:*:*