First published: Tue Oct 17 2023(Updated: )
A flaw was found in iperf, a utility for testing network performance using TCP, UDP, and SCTP. A malicious or malfunctioning client can send less than the expected amount of data to the iperf server, which can cause the server to hang indefinitely waiting for the remainder or until the connection gets closed. This will prevent other connections to the server, leading to a denial of service.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/iperf | <3.15 | 3.15 |
iperf3 | <3.15 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 | |
Red Hat Enterprise Linux | =8.0_aarch64 | |
Red Hat Enterprise Linux | =9.0_aarch64 | |
Red Hat Enterprise Linux for IBM Z Systems | =8.0_s390x | |
Red Hat Enterprise Linux for IBM Z Systems | =9.0_s390x | |
Red Hat Enterprise Linux for Power, little endian | =8.0_ppc64le |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-7250 is classified as a medium severity vulnerability.
To fix CVE-2023-7250, upgrade iperf to version 3.15 or later.
CVE-2023-7250 affects iperf versions prior to 3.15 on various Red Hat Enterprise Linux versions.
CVE-2023-7250 can cause the iperf server to hang indefinitely when receiving insufficient data from a client.
Yes, CVE-2023-7250 can be exploited by a malicious or malfunctioning client sending less data than expected.