THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2023-7250

Iperf3: possible denial of service

Assignerredhat
Reserved2024-03-15
Published2024-03-18
Updated2024-07-05

Description

A flaw was found in iperf, a utility for testing network performance using TCP, UDP, and SCTP. A malicious or malfunctioning client can send less than the expected amount of data to the iperf server, which can cause the server to hang indefinitely waiting for the remainder or until the connection gets closed. This will prevent other connections to the server, leading to a denial of service.



MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Problem types

Permissive List of Allowed Inputs

Product status

Default status
affected

0:3.5-10.el8_10 before *
unaffected

Default status
unknown

Default status
affected

Timeline

2023-10-17:Reported to Red Hat.
2023-10-16:Made public.

References

https://access.redhat.com/errata/RHSA-2024:4241 (RHSA-2024:4241) vendor-advisory

https://access.redhat.com/security/cve/CVE-2023-7250 vdb-entry

https://bugzilla.redhat.com/show_bug.cgi?id=2244707 (RHBZ#2244707) issue-tracking

cve.org CVE-2023-7250

nvd.nist.gov CVE-2023-7250

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2023-7250
© Copyright 2024 THREATINT. Made in Cyprus with +