Lucene search

K
symantecSymantec Security ResponseSMNTC-110605
HistoryOct 09, 2019 - 12:00 a.m.

OpenSSH CVE-2019-16905 Integer Overflow Vulnerability

2019-10-0900:00:00
Symantec Security Response
www.symantec.com
759

Description

OpenSSH is prone to an integer overflow vulnerability. Attackers can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will likely cause a denial-of-service condition. OpenSSH versions 7.7 through 7.9 and 8.x prior to 8.1 are vulnerable.

Technologies Affected

  • OpenSSH OpenSSH 7.7
  • OpenSSH OpenSSH 7.8
  • OpenSSH OpenSSH 7.9
  • OpenSSH OpenSSH 8.0

Recommendations

Permit local access for trusted individuals only. Where possible, use restricted environments and restricted shells.
Ensure that only trusted users have local, interactive access to affected computers.

Implement multiple redundant layers of security.
Various memory-protection schemes (such as nonexecutable and randomly mapped memory segments) may hinder an attacker’s ability to exploit this vulnerability.

Updates are available. Please see the references or vendor advisory for more information.