Description
lsh daemon (lshd) does not properly return from certain functions in (1) read_line.c, (2) channel_commands.c, or (3) client_keyexchange.c when long input is provided, which could allow remote attackers to execute arbitrary code via a heap-based buffer overflow attack.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by m00 security · cremotelinux
https://www.exploit-db.com/exploits/23162
exploitdb
WORKING POC
VERIFIED
by Carl Livitt · cremotelinux
https://www.exploit-db.com/exploits/23161
References (6)
Scores
EPSS
0.2729
EPSS Percentile
96.4%
Details
Status
published
Products (3)
gnu/lsh
1.4
gnu/lsh
1.4.1
gnu/lsh
1.4.2
Published
Oct 06, 2003
Tracked Since
Feb 18, 2026