跳转到帖子

Amazon Linux 2023: CVE-2023-38403: Important priority package update for iperf3

recommended_posts

发布于
  • Members

Amazon Linux 2023: CVE-2023-38403: Important priority package update for iperf3

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
07/11/2023
Created
02/14/2025
Added
02/14/2025
Modified
02/14/2025

Description

iperf3 before 3.14 allows peers to cause an integer overflow and heap corruption via a crafted length field. An integer overflow flaw was found in the way iperf3 dynamically allocates memory buffers for JSON-formatted messages. A remote attacker could send a specially crafted sequence of bytes on the iperf3 control channel with a specified JSON message length of 0xffffffff to trigger an integer overflow leading the receiving process to abort due to heap corruption. This flaw allows an attacker to use a malicious client to cause a denial of service of an iperf3 server or potentially use a malicious server to cause connecting clients to crash.

Solution(s)

  • amazon-linux-2023-upgrade-iperf3
  • amazon-linux-2023-upgrade-iperf3-debuginfo
  • amazon-linux-2023-upgrade-iperf3-debugsource
  • amazon-linux-2023-upgrade-iperf3-devel

References

  • https://attackerkb.com/topics/cve-2023-38403
  • CVE - 2023-38403
  • https://alas.aws.amazon.com/AL2023/ALAS-2023-274.html
  • 查看数 701
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…