CVE-2023-7250

A flaw was found in iperf, a utility for testing network performance using TCP, UDP, and SCTP. A malicious or malfunctioning client can send less than the expected amount of data to the iperf server, which can cause the server to hang indefinitely waiting for the remainder or until the connection gets closed. This will prevent other connections to the server, leading to a denial of service.
Configurations

Configuration 1 (hide)

cpe:2.3:a:es:iperf3:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0_aarch64:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0_aarch64:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0_ppc64le:*:*:*:*:*:*:*

History

07 Apr 2025, 16:57

Type Values Removed Values Added
First Time Redhat enterprise Linux For Ibm Z Systems
Es iperf3
Redhat
Redhat enterprise Linux
Es
Redhat enterprise Linux For Power Little Endian
Redhat enterprise Linux For Arm 64
References () https://access.redhat.com/errata/RHSA-2024:4241 - () https://access.redhat.com/errata/RHSA-2024:4241 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2024:9185 - () https://access.redhat.com/errata/RHSA-2024:9185 - Third Party Advisory
References () https://access.redhat.com/security/cve/CVE-2023-7250 - () https://access.redhat.com/security/cve/CVE-2023-7250 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2244707 - () https://bugzilla.redhat.com/show_bug.cgi?id=2244707 - Issue Tracking, Third Party Advisory
CPE cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*
cpe:2.3:a:es:iperf3:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0_aarch64:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0_aarch64:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0_ppc64le:*:*:*:*:*:*:*

Information

Published : 2024-03-18 13:15

Updated : 2025-04-07 16:57


NVD link : CVE-2023-7250

Mitre link : CVE-2023-7250

CVE.ORG link : CVE-2023-7250


JSON object : View

Products Affected

redhat

  • enterprise_linux_for_arm_64
  • enterprise_linux_for_power_little_endian
  • enterprise_linux
  • enterprise_linux_for_ibm_z_systems

es

  • iperf3
CWE
CWE-183

Permissive List of Allowed Inputs