CVE-2003-0826

Source
https://nvd.nist.gov/vuln/detail/CVE-2003-0826
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2003-0826.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2003-0826
Published
2003-10-06T04:00:00Z
Modified
2025-04-03T01:03:51Z
Downstream
Summary
[none]
Details

lsh daemon (lshd) does not properly return from certain functions in (1) readline.c, (2) channelcommands.c, or (3) client_keyexchange.c when long input is provided, which could allow remote attackers to execute arbitrary code via a heap-based buffer overflow attack.

References

Affected packages

Debian:11 / lsh-utils

Package

Name
lsh-utils
Purl
pkg:deb/debian/lsh-utils?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.2-6

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / lsh-utils

Package

Name
lsh-utils
Purl
pkg:deb/debian/lsh-utils?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.2-6

Ecosystem specific

{
    "urgency": "not yet assigned"
}