Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-54351

Опубликовано: 03 авг. 2025
Источник: redhat
CVSS3: 8.9
EPSS Низкий

Описание

In iperf before 3.19.1, net.c has a buffer overflow when --skip-rx-copy is used (for MSG_TRUNC in recv).

A flaw was found in iperf3. The recv function in net.c exhibits a buffer overflow when the --skip-rx-copy option is used with MSG_TRUNC, allowing a network attacker to trigger the overflow. This vulnerability allows an attacker to send a specially crafted message. The resulting buffer overflow may lead to an application-level denial of service.

Отчет

This vulnerability was introduced with option --skip-rx-copy which was added after version 3.17.1. We currently have an older version of code in Red Hat Enterprise Linux(RHEL). No Red Hat products or offerings are affected by this vulnerability. This vulnerability marked as Important instead a Moderate flaw due to the nature of the bug and the execution context. The flaw lies in the mishandling of buffer boundaries when the MSG_TRUNC flag is used in conjunction with the --skip-rx-copy option, leading to a classical buffer overflow. Unlike typical logic or input validation bugs that may merely crash an application, buffer overflows directly corrupt memory, potentially allowing arbitrary code execution depending on memory layout and platform-specific mitigations. Since iperf3 is often used in automated performance testing setups, CI pipelines, or even embedded environments, attackers could exploit this vulnerability remotely by sending crafted UDP packets, leading to memory corruption without any authentication. The use of MSG_TRUNC and skipped copy operations already places the application in a performance-optimized but less safe path, and the lack of proper bounds checking under these conditions makes it a memory safety issue—a class of bugs known to be exploitable and impactful

Меры по смягчению последствий

No mitigation is currently available that meets Red Hat Product Security’s standards for usability, deployment, applicability, or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10iperf3Not affected
Red Hat Enterprise Linux 7iperf3Not affected
Red Hat Enterprise Linux 8iperf3Not affected
Red Hat Enterprise Linux 9iperf3Not affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-420

EPSS

Процентиль: 17%
0.00054
Низкий

8.9 High

CVSS3

Связанные уязвимости

CVSS3: 8.9
ubuntu
26 дней назад

In iperf before 3.19.1, net.c has a buffer overflow when --skip-rx-copy is used (for MSG_TRUNC in recv).

CVSS3: 8.9
nvd
26 дней назад

In iperf before 3.19.1, net.c has a buffer overflow when --skip-rx-copy is used (for MSG_TRUNC in recv).

CVSS3: 8.9
debian
26 дней назад

In iperf before 3.19.1, net.c has a buffer overflow when --skip-rx-cop ...

CVSS3: 8.9
github
26 дней назад

In iperf before 3.19.1, net.c has a buffer overflow when --skip-rx-copy is used (for MSG_TRUNC in recv).

CVSS3: 10
redos
4 дня назад

Множественные уязвимости iperf3

EPSS

Процентиль: 17%
0.00054
Низкий

8.9 High

CVSS3