
CVE-2006-0353
https://notcve.org/view.php?id=CVE-2006-0353
22 Jan 2006 — unix_random.c in lshd for lsh 2.0.1 leaks file descriptors related to the randomness generator, which allows local users to cause a denial of service by truncating the seed file, which prevents the server from starting, or obtain sensitive seed information that could be used to crack keys. • http://lists.lysator.liu.se/pipermail/lsh-bugs/2006q1/000467.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2003-0826 – LSH 1.x - Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-2003-0826
23 Sep 2003 — lsh daemon (lshd) does not properly return from certain functions in (1) read_line.c, (2) channel_commands.c, or (3) client_keyexchange.c when long input is provided, which could allow remote attackers to execute arbitrary code via a heap-based buffer overflow attack. El demonio lsh (lshd) no vuelve adecuadamente de ciertas funciones en (1) read_line.c, (2), channel_commnads.c, o (3) client_keyechange.c, cuando se suminstra una entrada larga, lo que podría permitir a atacantes remotos ejecutar código arbitr... • https://www.exploit-db.com/exploits/23161 •