|Category:||FreeBSD Local Security Checks|
|Title:||FreeBSD Ports: lsh|
|Summary:||FreeBSD Ports: lsh|
|Description:||The remote host is missing an update to the system|
as announced in the referenced advisory.
The following package is affected: lsh
lsh daemon (lshd) does not properly return from certain functions in
(1) read_line.c, (2) channel_commands.c, or (3) client_keyexchange.c
when long input is provided, which could allow remote attackers to
execute arbitrary code via a heap-based buffer overflow attack.
Unknown vulnerability in lshd in Lysator LSH 1.x and 2.x before 2.0.1
allows remote attackers to cause a denial of service via unknown
Update your system with the appropriate patches or
Common Vulnerability Exposure (CVE) ID: CVE-2003-0826|
Bugtraq: 20030920 LSH: Buffer overrun and remote root compromise in lshd (Google Search)
Bugtraq: 20030919 Remote root vuln in lsh 1.4.x (Google Search)
Debian Security Information: DSA-717 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2005-0814
XForce ISS Database: lsh-lshd-dos(19724)
|Copyright||Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com|
|This is only one of 40246 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.