![]() ![]() This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. The SSH server running on the remote host is affected by a code execution vulnerability. Required KB Items : Settings/ParanoidReport
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |