OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.
2019-10-09T20:15:23.503
2025-04-23T16:15:20.437
Modified
CVSSv3.1: 7.8 (HIGH)
AV:L/AC:M/Au:N/C:P/I:P/A:P
3.4
6.4
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | openbsd | openssh | ≤ 7.9 | Yes |
| Application | openbsd | openssh | < 8.1 | Yes |
| Application | netapp | cloud_backup | - | Yes |
| Application | netapp | steelstore_cloud_integrated_storage | - | Yes |
| Operating System | siemens | scalance_x204rna_firmware | < 3.2.7 | Yes |
| Hardware | siemens | scalance_x204rna | - | No |
| Operating System | siemens | scalance_x204rna_ecc_firmware | < 3.2.7 | Yes |
| Hardware | siemens | scalance_x204rna_ecc | - | No |