Description
Buffer overflow in the USB Gadget RNDIS implementation in the Linux kernel before 2.6.16 allows remote attackers to cause a denial of service (kmalloc'd memory corruption) via a remote NDIS response to OID_GEN_SUPPORTED_LIST, which causes memory to be allocated for the reply data but not the reply structure.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1097-1 | New Kernel 2.4.27 packages fix several vulnerabilities |
Debian DSA |
DSA-1103-1 | New Linux kernel 2.6.8 packages fix several vulnerabilities |
EUVD |
EUVD-2006-1372 | Buffer overflow in the USB Gadget RNDIS implementation in the Linux kernel before 2.6.16 allows remote attackers to cause a denial of service (kmalloc'd memory corruption) via a remote NDIS response to OID_GEN_SUPPORTED_LIST, which causes memory to be allocated for the reply data but not the reply structure. |
Ubuntu USN |
USN-281-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T17:12:20.809Z
Reserved: 2006-03-23T00:00:00.000Z
Link: CVE-2006-1368
No data.
Status : Modified
Published: 2006-03-23T23:06:00.000
Modified: 2026-04-16T00:27:16.627
Link: CVE-2006-1368
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN