Korean
<< Back
VID 14038
Severity 30
Port 22
Protocol TCP
Class SSH
Detailed Description The LSH server, according to its banner, has a denial of service vulnerability. LSH is a freely available implementation of the Secure Shell (SSH) version 2 protocol for Unix-based operating systems. LSH versions prior to 2.0.1 are vulnerable to a denial of service attack. By sending a malformed key exchange message, a remote attacker could cause the affected application to stop responding or crash, ultimately denying service to legitimate users.

* Note: This check solely relied on the version number of the remote SSH server to assess this vulnerability, so this might be a false positive.

* References:
http://secunia.com/advisories/14609/
http://lists.lysator.liu.se/pipermail/lsh-bugs/2005q1/000328.html

* Platforms Affected:
LSH versions prior to 2.0.1
Linux Any version
Unix Any version
Recommendation For LSH versions prior to 2.0.1:
Upgrade to the latest version of LSH (2.0.1 or later), available from the Lysator Web page at http://www.lysator.liu.se/~nisse/archive/lsh-2.0.1.tar.gz

-- AND --

For LSH 2.0:
Apply the 2.0-2.0.1 patch for this vulnerability, available from the Lysator Archive Web page at http://lists.lysator.liu.se/pipermail/lsh-bugs/2005q1/000328.html
Related URL CVE-2005-0814 (CVE)
Related URL 12829 (SecurityFocus)
Related URL 19724 (ISS)