CVE-2023-54110
Unknown Unknown - Not Provided
Integer Overflow in Linux usb-rndis_host Causes Information Leak

Publication date: 2025-12-24

Last updated on: 2025-12-24

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: usb: rndis_host: Secure rndis_query check against int overflow Variables off and len typed as uint32 in rndis_query function are controlled by incoming RNDIS response message thus their value may be manipulated. Setting off to a unexpectetly large value will cause the sum with len and 8 to overflow and pass the implemented validation step. Consequently the response pointer will be referring to a location past the expected buffer boundaries allowing information leakage e.g. via RNDIS_OID_802_3_PERMANENT_ADDRESS OID.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-24
Last Modified
2025-12-24
Generated
2026-05-07
AI Q&A
2025-12-24
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Linux kernel's usb rndis_host component, specifically in the rndis_query function. The variables 'off' and 'len' are 32-bit unsigned integers controlled by incoming RNDIS response messages. An attacker can manipulate 'off' to a very large value, causing an integer overflow when adding 'len' and 8. This overflow bypasses validation checks, allowing the response pointer to reference memory beyond the intended buffer boundaries, which can lead to information leakage, such as exposing permanent MAC addresses via the RNDIS_OID_802_3_PERMANENT_ADDRESS OID.


How can this vulnerability impact me? :

This vulnerability can lead to information leakage by allowing an attacker to access memory beyond the expected buffer boundaries. Specifically, sensitive information like permanent hardware addresses (MAC addresses) could be exposed. This could compromise system confidentiality and potentially aid further attacks or unauthorized access.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart