CVE-2023-7250
Publication date 18 March 2024
Last updated 30 May 2025
Ubuntu priority
Cvss 3 Severity Score
A flaw was found in iperf, a utility for testing network performance using TCP, UDP, and SCTP. A malicious or malfunctioning client can send less than the expected amount of data to the iperf server, which can cause the server to hang indefinitely waiting for the remainder or until the connection gets closed. This will prevent other connections to the server, leading to a denial of service.
Status
Package | Ubuntu Release | Status |
---|---|---|
iperf3 | 25.04 plucky |
Not affected
|
24.04 LTS noble |
Not affected
|
|
22.04 LTS jammy |
Needs evaluation
|
|
20.04 LTS focal |
Needs evaluation
|
|
18.04 LTS bionic |
Needs evaluation
|
|
16.04 LTS xenial |
Needs evaluation
|
Severity score breakdown
Parameter | Value |
---|---|
Base score |
|
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | Low |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
References
Other references
- https://downloads.es.net/pub/iperf/esnet-secadv-2023-0002.txt.asc
- https://github.com/esnet/iperf/commit/5e3704dd850a5df2fb2b3eafd117963d017d07b4 (3.15)
- https://access.redhat.com/security/cve/CVE-2023-7250
- https://bugzilla.redhat.com/show_bug.cgi?id=2244707
- https://www.cve.org/CVERecord?id=CVE-2023-7250