CVE-2003-0826
LSH 1.x - Remote Buffer Overflow
Severity Score
9.8
*CVSS v3
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
2
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
lsh daemon (lshd) does not properly return from certain functions in (1) read_line.c, (2) channel_commands.c, or (3) client_keyexchange.c when long input is provided, which could allow remote attackers to execute arbitrary code via a heap-based buffer overflow attack.
El demonio lsh (lshd) no vuelve adecuadamente de ciertas funciones en (1) read_line.c, (2), channel_commnads.c, o (3) client_keyechange.c, cuando se suminstra una entrada larga, lo que podría permitir a atacantes remotos ejecutar código arbitrario mediante un ataque de desbordamientod e búfer basado en el montón.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2003-09-19 CVE Reserved
- 2003-09-19 First Exploit
- 2003-09-23 CVE Published
- 2023-10-08 EPSS Updated
- 2024-08-08 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
http://bugs.debian.org/211662 | X_refsource_confirm | |
http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/010496.html | Mailing List | |
http://lists.lysator.liu.se/pipermail/lsh-bugs/2003q3/000120.html | X_refsource_confirm | |
http://marc.info/?l=bugtraq&m=106398939512178&w=2 | Mailing List | |
http://marc.info/?l=bugtraq&m=106407188509874&w=2 | Mailing List |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/23161 | 2003-09-19 | |
https://www.exploit-db.com/exploits/23162 | 2003-09-19 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.debian.org/security/2005/dsa-717 | 2016-10-18 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Gnu Search vendor "Gnu" | Lsh Search vendor "Gnu" for product "Lsh" | 1.4 Search vendor "Gnu" for product "Lsh" and version "1.4" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Lsh Search vendor "Gnu" for product "Lsh" | 1.4.1 Search vendor "Gnu" for product "Lsh" and version "1.4.1" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Lsh Search vendor "Gnu" for product "Lsh" | 1.4.2 Search vendor "Gnu" for product "Lsh" and version "1.4.2" | - |
Affected
|