← Zuruck zu CVEs
CVE-2023-38403
HIGH7.5
Beschreibung
iperf3 before 3.14 allows peers to cause an integer overflow and heap corruption via a crafted length field.
CVE Details
CVSS v3.1 Bewertung7.5
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht7/17/2023
Zuletzt geandert11/21/2024
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
apple:macosdebian:debian_linuxes:iperf3fedoraproject:fedoralinux:linux_kernelnetapp:clustered_data_ontapnetapp:ontap_select_deploy_administration_utility
Schwachen (CWE)
CWE-190
Referenzen
http://seclists.org/fulldisclosure/2023/Oct/24(cve@mitre.org)
http://seclists.org/fulldisclosure/2023/Oct/26(cve@mitre.org)
https://bugs.debian.org/1040830(cve@mitre.org)
https://cwe.mitre.org/data/definitions/130.html(cve@mitre.org)
https://github.com/esnet/iperf/issues/1542(cve@mitre.org)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BV6EBWWF4PEQKROEVXGYSTIT2MGBTLU7/(cve@mitre.org)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M25Z5FHTO3XWMGP37JHJ7IIIHSGCLKEV/(cve@mitre.org)
https://security.netapp.com/advisory/ntap-20230818-0016/(cve@mitre.org)
https://support.apple.com/kb/HT213984(cve@mitre.org)
https://support.apple.com/kb/HT213985(cve@mitre.org)
http://seclists.org/fulldisclosure/2023/Oct/24(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2023/Oct/26(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.debian.org/1040830(af854a3a-2127-422b-91ae-364da2661108)
https://cwe.mitre.org/data/definitions/130.html(af854a3a-2127-422b-91ae-364da2661108)
https://downloads.es.net/pub/iperf/esnet-secadv-2023-0001.txt.asc(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/esnet/iperf/commit/0ef151550d96cc4460f98832df84b4a1e87c65e9(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/esnet/iperf/issues/1542(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2023/07/msg00025.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BV6EBWWF4PEQKROEVXGYSTIT2MGBTLU7/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M25Z5FHTO3XWMGP37JHJ7IIIHSGCLKEV/(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20230818-0016/(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/kb/HT213984(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/kb/HT213985(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.