OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and remote code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.

Published : 2019-10-09 20:15 Updated : 2019-10-16 17:14

CVSS Score More info
Score 7.5 / 10
Vendor Product Version URI
Openbsd Openssh 7.7 cpe:/a:openbsd:openssh:7.7:-
Openbsd Openssh 7.7 cpe:/a:openbsd:openssh:7.7:p1
Openbsd Openssh 7.8 cpe:/a:openbsd:openssh:7.8:-
Openbsd Openssh 7.8 cpe:/a:openbsd:openssh:7.8:p1
Openbsd Openssh 7.9 cpe:/a:openbsd:openssh:7.9:-
Openbsd Openssh 7.9 cpe:/a:openbsd:openssh:7.9:p1
Openbsd Openssh 8.0 cpe:/a:openbsd:openssh:8.0:-
Openbsd Openssh 8.0 cpe:/a:openbsd:openssh:8.0:p1
  1. Openbsd (1) Search CVE
    1. Openssh (4) Search CVE
      1. 7.7
      2. 7.8
      3. 7.9
      4. 8.0


ID Name Description Links
CWE-190 Integer Overflow or Wraparound The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control. CVE

History of changes

Date Event
2019-10-16 17:14
2019-10-09 20:25