跳转到帖子

Oracle Linux: CVE-2023-38403: ELSA-2023-4326: iperf3 security update (IMPORTANT) (Multiple Advisories)

recommended_posts

发布于
  • Members

Oracle Linux: CVE-2023-38403: ELSA-2023-4326:iperf3 security update (IMPORTANT) (Multiple Advisories)

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
07/11/2023
Created
08/02/2023
Added
08/01/2023
Modified
01/07/2025

Description

iperf3 before 3.14 allows peers to cause an integer overflow and heap corruption via a crafted length field. An integer overflow flaw was found in the way iperf3 dynamically allocates memory buffers for JSON-formatted messages. A remote attacker could send a specially crafted sequence of bytes on the iperf3 control channel with a specified JSON message length of 0xffffffff to trigger an integer overflow leading the receiving process to abort due to heap corruption. This flaw allows an attacker to use a malicious client to cause a denial of service of an iperf3 server or potentially use a malicious server to cause connecting clients to crash.

Solution(s)

  • oracle-linux-upgrade-iperf3
  • oracle-linux-upgrade-iperf3-devel

References

  • https://attackerkb.com/topics/cve-2023-38403
  • CVE - 2023-38403
  • ELSA-2023-4326
  • ELSA-2023-4570
  • ELSA-2023-4571
  • 查看数 700
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…