lsh daemon (lshd) does not properly return from certain functions in (1) read_line.c, (2) channel_commands.c, or (3) client_keyexchange.c when long input is provided, which could allow remote attackers to execute arbitrary code via a heap-based buffer overflow attack.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:45
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.debian.org/211662 - | |
References | () http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/010496.html - | |
References | () http://lists.lysator.liu.se/pipermail/lsh-bugs/2003q3/000120.html - | |
References | () http://marc.info/?l=bugtraq&m=106398939512178&w=2 - | |
References | () http://marc.info/?l=bugtraq&m=106407188509874&w=2 - | |
References | () http://www.debian.org/security/2005/dsa-717 - |
Information
Published : 2003-10-06 04:00
Updated : 2024-11-20 23:45
NVD link : CVE-2003-0826
Mitre link : CVE-2003-0826
CVE.ORG link : CVE-2003-0826
JSON object : View
Products Affected
gnu
- lsh
CWE