A flaw was found in iperf, a utility for testing network performance using TCP, UDP, and SCTP. A malicious or malfunctioning client can send less than the expected amount of data to the iperf server, which can cause the server to hang indefinitely waiting for the remainder or until the connection gets closed. This will prevent other connections to the server, leading to a denial of service.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2024:4241 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2024:9185 | Third Party Advisory |
https://access.redhat.com/security/cve/CVE-2023-7250 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2244707 | Issue Tracking Third Party Advisory |
https://access.redhat.com/errata/RHSA-2024:4241 | Third Party Advisory |
https://access.redhat.com/security/cve/CVE-2023-7250 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2244707 | Issue Tracking Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
07 Apr 2025, 16:57
Type | Values Removed | Values Added |
---|---|---|
First Time |
Redhat enterprise Linux For Ibm Z Systems
Es iperf3 Redhat Redhat enterprise Linux Es Redhat enterprise Linux For Power Little Endian Redhat enterprise Linux For Arm 64 |
|
References | () https://access.redhat.com/errata/RHSA-2024:4241 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:9185 - Third Party Advisory | |
References | () https://access.redhat.com/security/cve/CVE-2023-7250 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2244707 - Issue Tracking, Third Party Advisory | |
CPE | cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:* cpe:2.3:a:es:iperf3:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0_aarch64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0_aarch64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0_ppc64le:*:*:*:*:*:*:* |
Information
Published : 2024-03-18 13:15
Updated : 2025-04-07 16:57
NVD link : CVE-2023-7250
Mitre link : CVE-2023-7250
CVE.ORG link : CVE-2023-7250
JSON object : View
Products Affected
redhat
- enterprise_linux_for_arm_64
- enterprise_linux_for_power_little_endian
- enterprise_linux
- enterprise_linux_for_ibm_z_systems
es
- iperf3
CWE
CWE-183
Permissive List of Allowed Inputs