Description
NewNTUnicodeString does not check for string length overflow. When provided with a string that overflows the maximum size of a NTUnicodeString (a 16-bit number of bytes), it returns a truncated string rather than an error.
Published: 2026-05-22
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability exists in the golang.org/x/sys/windows package, where the NewNTUnicodeString function does not enforce the maximum length limit of a NTUnicodeString. When a string larger than the 16‑bit length field is supplied, the function silently truncates the string instead of reporting an error.

Affected Systems

The only vendor and product explicitly listed is golang.org/x/sys/windows. No specific versions are given, so any release that uses the current implementation of NewNTUnicodeString before a fix may be impacted.

Risk and Exploitability

EPSS information is not available and the issue is not listed in CISA KEV, indicating limited publicly known exploitation. The problem is an integer overflow that leads to truncation, but no exploitation details are disclosed. The risk depends on how the function is used in applications; it may cause unexpected behavior if the full string is required.

Generated by OpenCVE AI on May 22, 2026 at 21:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to a Golang release that includes the NewNTUnicodeString integer overflow fix.
  • If an upgrade is impractical, validate the length of the string before calling NewNTUnicodeString to ensure it does not exceed the maximum NTUnicodeString size.
  • Review and audit code paths that use NewNTUnicodeString to confirm that truncated values will not introduce logic errors, and adjust logic if necessary.

Generated by OpenCVE AI on May 22, 2026 at 21:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 22 May 2026 22:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20
CWE-680

Fri, 22 May 2026 20:00:00 +0000

Type Values Removed Values Added
Description NewNTUnicodeString does not check for string length overflow. When provided with a string that overflows the maximum size of a NTUnicodeString (a 16-bit number of bytes), it returns a truncated string rather than an error.
Title Invoking integer overflow in NewNTUnicodeString in golang.org/x/sys/windows
References

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Go

Published:

Updated: 2026-05-22T19:39:47.629Z

Reserved: 2026-04-07T18:13:03.527Z

Link: CVE-2026-39824

cve-icon Vulnrichment

No data.

cve-icon NVD

No data.

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-22T22:00:12Z

Weaknesses