Description
Buffer overflow in the USB Gadget RNDIS implementation in the Linux kernel before 2.6.16 allows remote attackers to cause a denial of service (kmalloc'd memory corruption) via a remote NDIS response to OID_GEN_SUPPORTED_LIST, which causes memory to be allocated for the reply data but not the reply structure.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1097-1 | New Kernel 2.4.27 packages fix several vulnerabilities |
Debian DSA |
DSA-1103-1 | New Linux kernel 2.6.8 packages fix several vulnerabilities |
EUVD |
EUVD-2006-1372 | Buffer overflow in the USB Gadget RNDIS implementation in the Linux kernel before 2.6.16 allows remote attackers to cause a denial of service (kmalloc'd memory corruption) via a remote NDIS response to OID_GEN_SUPPORTED_LIST, which causes memory to be allocated for the reply data but not the reply structure. |
Ubuntu USN |
USN-281-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T17:12:20.809Z
Reserved: 2006-03-23T00:00:00.000Z
Link: CVE-2006-1368
No data.
Status : Modified
Published: 2006-03-23T23:06:00.000
Modified: 2026-04-16T00:27:16.627
Link: CVE-2006-1368
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN