OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.
Advisories
Source ID Title
EUVD EUVD EUVD-2019-7402 OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00218}

epss

{'score': 0.00196}


Wed, 23 Apr 2025 16:30:00 +0000

Type Values Removed Values Added
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-04-23T15:45:01.432Z

Reserved: 2019-09-26T00:00:00.000Z

Link: CVE-2019-16905

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-10-09T20:15:23.503

Modified: 2025-04-23T16:15:20.437

Link: CVE-2019-16905

cve-icon Redhat

Severity : Important

Publid Date: 2019-08-28T00:00:00Z

Links: CVE-2019-16905 - Bugzilla

cve-icon OpenCVE Enrichment

No data.