VYPR
Unrated severityNVD Advisory· Published Oct 6, 2003· Updated Apr 16, 2026

CVE-2003-0826

CVE-2003-0826

Description

lsh daemon (lshd) does not properly return from certain functions in (1) read_line.c, (2) channel_commands.c, or (3) client_keyexchange.c when long input is provided, which could allow remote attackers to execute arbitrary code via a heap-based buffer overflow attack.

Affected products

3
  • GNU/Lsh3 versions
    cpe:2.3:a:gnu:lsh:1.4:*:*:*:*:*:*:*+ 2 more
    • cpe:2.3:a:gnu:lsh:1.4:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:lsh:1.4.1:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:lsh:1.4.2:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.