First published: Mon Oct 16 2023(Updated: )
It was discovered that iperf3 did not properly manage certain inputs, which could lead to a crash. A remote attacker could possibly use this issue to cause a denial of service. (CVE-2023-38403) Jorge Sancho Larraz discovered that iperf3 did not properly manage certain inputs, which could cause the server process to stop responding, waiting for input on the control connection. A remote attacker could possibly use this issue to cause a denial of service. (LP: #2038654)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/iperf3 | <3.7-3ubuntu0.1~esm1 | 3.7-3ubuntu0.1~esm1 |
=20.04 | ||
All of | ||
ubuntu/libiperf0 | <3.7-3ubuntu0.1~esm1 | 3.7-3ubuntu0.1~esm1 |
=20.04 | ||
All of | ||
ubuntu/iperf3 | <3.1.3-1ubuntu0.1~esm1 | 3.1.3-1ubuntu0.1~esm1 |
=18.04 | ||
All of | ||
ubuntu/libiperf0 | <3.1.3-1ubuntu0.1~esm1 | 3.1.3-1ubuntu0.1~esm1 |
=18.04 | ||
All of | ||
ubuntu/iperf3 | <3.0.11-1ubuntu0.1~esm2 | 3.0.11-1ubuntu0.1~esm2 |
=16.04 | ||
All of | ||
ubuntu/libiperf0 | <3.0.11-1ubuntu0.1~esm2 | 3.0.11-1ubuntu0.1~esm2 |
=16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-6431-1 is a security advisory issued by Ubuntu that addresses vulnerabilities in the iperf3 package.
The affected software versions are iperf3 3.7-3ubuntu0.1~esm1 on Ubuntu 20.04, iperf3 3.1.3-1ubuntu0.1~esm1 on Ubuntu 18.04, and iperf3 3.0.11-1ubuntu0.1~esm2 on Ubuntu 16.04.
The vulnerability allows a remote attacker to cause a denial of service by crashing iperf3 due to improper input handling.
Yes, the remedy for the vulnerability is to update to iperf3 package version 3.7-3ubuntu0.1~esm1 on Ubuntu 20.04, 3.1.3-1ubuntu0.1~esm1 on Ubuntu 18.04, or 3.0.11-1ubuntu0.1~esm2 on Ubuntu 16.04.
You can find more information in the Ubuntu Security Notice USN-6431-1 and the associated references.