First published: Wed Oct 09 2019(Updated: )
OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openbsd Openssh | >=7.7<=7.9 | |
Openbsd Openssh | >=8.0<8.1 | |
Netapp Cloud Backup | ||
Netapp Steelstore Cloud Integrated Storage | ||
Siemens Scalance X204rna Firmware | <3.2.7 | |
Siemens Scalance X204rna | ||
Siemens Scalance X204rna Ecc Firmware | <3.2.7 | |
Siemens Scalance X204rna Ecc |
https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/sshkey-xmss.c.diff?r1=1.5&r2=1.6&f=h
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-16905 is high with a severity value of 7.8.
OpenSSH versions 7.7 through 7.9 and versions 8.x before 8.1 when compiled with an experimental key type are affected. Netapp Cloud Backup and Netapp Steelstore Cloud Integrated Storage are also affected.
CVE-2019-16905 affects OpenSSH when it is compiled with an experimental key type, leading to a pre-authentication integer overflow and memory corruption.
Siemens Scalance X204rna is vulnerable to CVE-2019-16905 if it is running the affected firmware versions.
To fix the vulnerability in OpenSSH, you should update to version 8.1 or higher.