| VID |
14038 |
| Severity |
30 |
| Port |
22 |
| Protocol |
TCP |
| Class |
SSH |
| Detailed Description |
The LSH server, according to its banner, has a denial of service vulnerability. LSH is a freely available implementation of the Secure Shell (SSH) version 2 protocol for Unix-based operating systems. LSH versions prior to 2.0.1 are vulnerable to a denial of service attack. By sending a malformed key exchange message, a remote attacker could cause the affected application to stop responding or crash, ultimately denying service to legitimate users.
* Note: This check solely relied on the version number of the remote SSH server to assess this vulnerability, so this might be a false positive.
* References: http://secunia.com/advisories/14609/ http://lists.lysator.liu.se/pipermail/lsh-bugs/2005q1/000328.html
* Platforms Affected: LSH versions prior to 2.0.1 Linux Any version Unix Any version |
| Recommendation |
For LSH versions prior to 2.0.1: Upgrade to the latest version of LSH (2.0.1 or later), available from the Lysator Web page at http://www.lysator.liu.se/~nisse/archive/lsh-2.0.1.tar.gz
-- AND --
For LSH 2.0: Apply the 2.0-2.0.1 patch for this vulnerability, available from the Lysator Archive Web page at http://lists.lysator.liu.se/pipermail/lsh-bugs/2005q1/000328.html |
| Related URL |
CVE-2005-0814 (CVE) |
| Related URL |
12829 (SecurityFocus) |
| Related URL |
19724 (ISS) |
|