Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
TitleOpenSSH: Integer overflow
Informations
NameGLSA-201911-01First vendor Publication2019-11-07
VendorGentooLast vendor Modification2019-11-07
Severity (Vendor) N/ARevisionN/A

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score7.5Attack RangeNetwork
Cvss Impact Score6.4Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Synopsis

An integer overflow in OpenSSH might allow an attacker to execute arbitrary code.

Background

OpenSSH is a complete SSH protocol implementation that includes SFTP client and server support.

Description

OpenSSH, when built with "xmss" USE flag enabled, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key.

NOTE: This USE flag is disabled by default!

Impact

A remote attacker could connect to a vulnerable OpenSSH server using a special crafted XMSS key possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition.

Workaround

Disable XMSS key type.

Resolution

All OpenSSH users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=net-misc/openssh/openssh-8.0_p1-r4"

References

[ 1 ] CVE-2019-16905 : https://nvd.nist.gov/vuln/detail/CVE-2019-16905

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

https://security.gentoo.org/glsa/201911-01

Original Source

Url : http://security.gentoo.org/glsa/glsa-201911-01.xml

CWE : Common Weakness Enumeration

%idName
100 %CWE-190Integer Overflow or Wraparound (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application8

Alert History

If you want to see full details history, please login or register.
0
DateInformations
2019-11-07 21:18:32
  • First insertion