Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-16905

Опубликовано: 09 окт. 2019
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.4
CVSS3: 7.8

Описание

OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.

РелизСтатусПримечание
bionic

not-affected

code not present
devel

not-affected

code not built
disco

not-affected

code not built
esm-infra-legacy/trusty

not-affected

code not present
esm-infra/bionic

not-affected

code not present
esm-infra/xenial

not-affected

code not present
precise/esm

not-affected

code not present
trusty

ignored

end of standard support
trusty/esm

not-affected

code not present
upstream

needs-triage

Показывать по

РелизСтатусПримечание
bionic

not-affected

code not present
devel

not-affected

code not present
disco

not-affected

code not present
esm-apps/bionic

not-affected

code not present
esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

ignored

frozen on openssh 7.5p
xenial

DNE

Показывать по

EPSS

Процентиль: 32%
0.00123
Низкий

4.4 Medium

CVSS2

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
redhat
около 6 лет назад

OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.

CVSS3: 7.8
nvd
почти 6 лет назад

OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.

CVSS3: 7.8
msrc
почти 5 лет назад

Описание отсутствует

CVSS3: 7.8
debian
почти 6 лет назад

OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an expe ...

CVSS3: 7.8
github
больше 3 лет назад

OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and remote code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.

EPSS

Процентиль: 32%
0.00123
Низкий

4.4 Medium

CVSS2

7.8 High

CVSS3