CVE-2019-16905 — Integer Overflow or Wraparound in Openssh
Severity
7.8HIGHNVD
EPSS
0.3%
top 49.38%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 9
Latest updateFeb 14
Description
OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages5 packages
Patches
🔴Vulnerability Details
3📋Vendor Advisories
4Microsoft▶
OpenSSH 7.7 through 7.9 and 8.x before 8.1 when compiled with an experimental key type has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This lea↗2019-10-08
Red Hat
▶
Debian▶
CVE-2019-16905: openssh - OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental k...↗2019
💬Community
3Bugzilla▶
CVE-2019-16905 openssh: an integer overflow in the private key parsing code for the XMSS key type↗2019-11-01
Bugzilla▶
CVE-2019-16905 openssh: an integer overflow in the private key parsing code for the XMSS key type [fedora-30]↗2019-11-01
Bugzilla▶
CVE-2019-16905 openssh: an integer overflow in the private key parsing code for the XMSS key type [fedora-29]↗2019-11-01