Buffer Overflow Vulnerability in lsh Daemon by lshd
CVE-2003-0826
Currently unrated
Summary
The lsh daemon (lshd) is susceptible to a buffer overflow vulnerability that occurs due to improper handling of long input in specific functions such as read_line.c, channel_commands.c, and client_keyexchange.c. This flaw can be exploited by remote attackers to execute arbitrary code, potentially leading to unauthorized access and control over affected systems. Users of affected lsh versions should apply patches and updates to mitigate the risk.
References
EPSS Score
27% chance of being exploited in the next 30 days.
Timeline
Vulnerability published
Vulnerability Reserved