5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
6.9 Medium
AI Score
Confidence
Low
0.0004 Low
EPSS
Percentile
9.1%
Issue Overview:
It is possible for a malicious or malfunctioning client to send less
than the expected amount of data to the server. If this happens, the
server will hang indefinitely waiting for the remainder (or until the
connection gets closed). Because iperf3 is deliberately designed to
service only one client connection at a time, this will prevent other
connections to the iperf3 server.
Avoid running iperf3 with root privileges to minimize impact.
Update iperf3 to a version containing the fix (i.e. iperf-3.15 or
later). (CVE-2023-7250)
Affected Packages:
iperf3
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update iperf3 to update your system.
New Packages:
aarch64:
iperf3-3.1.7-2.amzn2.0.4.aarch64
iperf3-devel-3.1.7-2.amzn2.0.4.aarch64
iperf3-debuginfo-3.1.7-2.amzn2.0.4.aarch64
i686:
iperf3-3.1.7-2.amzn2.0.4.i686
iperf3-devel-3.1.7-2.amzn2.0.4.i686
iperf3-debuginfo-3.1.7-2.amzn2.0.4.i686
src:
iperf3-3.1.7-2.amzn2.0.4.src
x86_64:
iperf3-3.1.7-2.amzn2.0.4.x86_64
iperf3-devel-3.1.7-2.amzn2.0.4.x86_64
iperf3-debuginfo-3.1.7-2.amzn2.0.4.x86_64
Red Hat: CVE-2023-7250
Mitre: CVE-2023-7250
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 2 | aarch64 | iperf3 | < 3.1.7-2.amzn2.0.4 | iperf3-3.1.7-2.amzn2.0.4.aarch64.rpm |
Amazon Linux | 2 | aarch64 | iperf3-devel | < 3.1.7-2.amzn2.0.4 | iperf3-devel-3.1.7-2.amzn2.0.4.aarch64.rpm |
Amazon Linux | 2 | aarch64 | iperf3-debuginfo | < 3.1.7-2.amzn2.0.4 | iperf3-debuginfo-3.1.7-2.amzn2.0.4.aarch64.rpm |
Amazon Linux | 2 | i686 | iperf3 | < 3.1.7-2.amzn2.0.4 | iperf3-3.1.7-2.amzn2.0.4.i686.rpm |
Amazon Linux | 2 | i686 | iperf3-devel | < 3.1.7-2.amzn2.0.4 | iperf3-devel-3.1.7-2.amzn2.0.4.i686.rpm |
Amazon Linux | 2 | i686 | iperf3-debuginfo | < 3.1.7-2.amzn2.0.4 | iperf3-debuginfo-3.1.7-2.amzn2.0.4.i686.rpm |
Amazon Linux | 2 | x86_64 | iperf3 | < 3.1.7-2.amzn2.0.4 | iperf3-3.1.7-2.amzn2.0.4.x86_64.rpm |
Amazon Linux | 2 | x86_64 | iperf3-devel | < 3.1.7-2.amzn2.0.4 | iperf3-devel-3.1.7-2.amzn2.0.4.x86_64.rpm |
Amazon Linux | 2 | x86_64 | iperf3-debuginfo | < 3.1.7-2.amzn2.0.4 | iperf3-debuginfo-3.1.7-2.amzn2.0.4.x86_64.rpm |
5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
6.9 Medium
AI Score
Confidence
Low
0.0004 Low
EPSS
Percentile
9.1%