Korean
<< Back
VID 14034
Severity 40
Port 22
Protocol TCP
Class Ssh
Detailed Description The LSH daemon, according to its banner, is vulnerable to a Heap-based Buffer Overflow Vulnerability.
LSH is a freely available implementation of the SSH version 2 protocol for Unix and Linux-based operating systems. The older versions than 1.5.3 of LSH daemon are vulnerable to a heap-based buffer overflow, caused by improper bound checking. If a remote attack can exploit this vulnerability successfully, it can result in the execution of arbitrary code on the system with root privileges.

* Note: This check solely relied on the banner of the remote LSH server to assess this vulnerability, so this might be a false positive.

* References:
http://archives.neohapsis.com/archives/bugtraq/2003-09/0310.html
http://archives.neohapsis.com/archives/bugtraq/2003-09/0326.html

* Platforms Affected:
LSH 1.5, 1.5.1, 1.5.2
LSH prior to 1.4.3
Linux Any version
Unix Any version
Recommendation Upgrade to the latest version of LSH (1.4.3 or later) for LSH prior to 1.4.3 or the the latest version of LSH (1.5.3 or later) for LSH prior to 1.5.3, available from the LSH Web page at http://www.lysator.liu.se/~nisse/lsh
Related URL CVE-2003-0826 (CVE)
Related URL 8655 (SecurityFocus)
Related URL 13245 (ISS)