CVE-2023-38403

iperf3 before 3.14 allows peers to cause an integer overflow and heap corruption via a crafted length field.
References
Link Resource
http://seclists.org/fulldisclosure/2023/Oct/24 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2023/Oct/26 Mailing List Third Party Advisory
https://bugs.debian.org/1040830 Third Party Advisory
https://cwe.mitre.org/data/definitions/130.html Third Party Advisory
https://downloads.es.net/pub/iperf/esnet-secadv-2023-0001.txt.asc Vendor Advisory
https://github.com/esnet/iperf/commit/0ef151550d96cc4460f98832df84b4a1e87c65e9 Patch
https://github.com/esnet/iperf/issues/1542 Issue Tracking Vendor Advisory
https://lists.debian.org/debian-lts-announce/2023/07/msg00025.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BV6EBWWF4PEQKROEVXGYSTIT2MGBTLU7/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M25Z5FHTO3XWMGP37JHJ7IIIHSGCLKEV/ Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20230818-0016/ Third Party Advisory
https://support.apple.com/kb/HT213984 Release Notes Third Party Advisory
https://support.apple.com/kb/HT213985 Release Notes Third Party Advisory
http://seclists.org/fulldisclosure/2023/Oct/24 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2023/Oct/26 Mailing List Third Party Advisory
https://bugs.debian.org/1040830 Third Party Advisory
https://cwe.mitre.org/data/definitions/130.html Third Party Advisory
https://downloads.es.net/pub/iperf/esnet-secadv-2023-0001.txt.asc Vendor Advisory
https://github.com/esnet/iperf/commit/0ef151550d96cc4460f98832df84b4a1e87c65e9 Patch
https://github.com/esnet/iperf/issues/1542 Issue Tracking Vendor Advisory
https://lists.debian.org/debian-lts-announce/2023/07/msg00025.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BV6EBWWF4PEQKROEVXGYSTIT2MGBTLU7/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M25Z5FHTO3XWMGP37JHJ7IIIHSGCLKEV/ Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20230818-0016/ Third Party Advisory
https://support.apple.com/kb/HT213984 Release Notes Third Party Advisory
https://support.apple.com/kb/HT213985 Release Notes Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:es:iperf3:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:clustered_data_ontap:9.0:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:14.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2023-07-17 21:15

Updated : 2024-11-21 08:13


NVD link : CVE-2023-38403

Mitre link : CVE-2023-38403

CVE.ORG link : CVE-2023-38403


JSON object : View

Products Affected

debian

  • debian_linux

fedoraproject

  • fedora

netapp

  • clustered_data_ontap
  • ontap_select_deploy_administration_utility

apple

  • macos

es

  • iperf3

linux

  • linux_kernel
CWE
CWE-190

Integer Overflow or Wraparound