unix_random.c in lshd for lsh 2.0.1 leaks file descriptors related to the randomness generator, which allows local users to cause a denial of service by truncating the seed file, which prevents the server from starting, or obtain sensitive seed information that could be used to crack keys.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/16357 | patch vdb entry |
http://lists.lysator.liu.se/pipermail/lsh-bugs/2006q1/000467.html | vendor advisory mailing list |
http://secunia.com/advisories/18623 | patch vendor advisory third party advisory |
http://www.osvdb.org/22695 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/24263 | vdb entry |
http://www.debian.org/security/2006/dsa-956 | patch vendor advisory |
http://www.vupen.com/english/advisories/2006/0301 | vdb entry vendor advisory |
http://secunia.com/advisories/18564 | patch vendor advisory third party advisory |