CVE-2019-16905
moderate-risk
Published 2019-10-09
OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.
Do I need to act?
-
0.27% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.8/10
High
LOCAL
/ LOW complexity
Affected Products (5)
Scalance X204Rna Ecc Firmware
References (18)
Issue Tracking
https://bugzilla.suse.com/show_bug.cgi?id=1153537
Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
Third Party Advisory
https://security.gentoo.org/glsa/201911-01
Third Party Advisory
https://security.netapp.com/advisory/ntap-20191024-0003/
Release Notes
https://www.openssh.com/releasenotes.html
Issue Tracking
https://bugzilla.suse.com/show_bug.cgi?id=1153537
Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
Third Party Advisory
https://security.gentoo.org/glsa/201911-01
Third Party Advisory
https://security.netapp.com/advisory/ntap-20191024-0003/
Release Notes
https://www.openssh.com/releasenotes.html
37
/ 100
moderate-risk
Severity
24/34 · High
Exploitability
1/34 · Minimal
Exposure
12/34 · Low