OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
23 Apr 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2019-10-09 20:15
Updated : 2025-04-23 16:15
NVD link : CVE-2019-16905
Mitre link : CVE-2019-16905
CVE.ORG link : CVE-2019-16905
JSON object : View
Products Affected
netapp
- steelstore_cloud_integrated_storage
- cloud_backup
openbsd
- openssh
siemens
- scalance_x204rna_firmware
- scalance_x204rna_ecc_firmware
- scalance_x204rna
- scalance_x204rna_ecc
CWE
CWE-190
Integer Overflow or Wraparound