Family: SuSE Local Security Checks --> Category: infos
SUSE-SA:2003:041: lsh Vulnerability Scan
Vulnerability Scan Summary
Check for the version of the lsh package
Detailed Explanation for this Vulnerability Test
The remote host is missing the patch for the advisory SUSE-SA:2003:041 (lsh).
LSH is the GNU implementation of SSH and can be seen as an alternative
Recently various remotely exploitable buffer overflows have been
reported in LSH. These allow attackers to execute arbitrary code as root
on un-patched systems.
LSH is not installed by default on SUSE LINUX. An update is therefore
only recommended if you run LSH.
Maintained SUSE products are not affected by this bug as LSH is not
packaged on maintained products such as the Enterprise Server.
For the updates to take effect execute the following command as root:
Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command 'rpm -Fhv file.rpm' to apply
Solution : http://www.suse.de/security/2003_041_lsh.html
Threat Level: Medium
Click HERE for more information and discussions on this network vulnerability scan.