Количество 21
Количество 21
RLSA-2024:9185
Moderate: iperf3 security update
RLSA-2024:4241
Moderate: iperf3 security update
ELSA-2024-9185
ELSA-2024-9185: iperf3 security update (MODERATE)
ELSA-2024-4241
ELSA-2024-4241: iperf3 security update (MODERATE)
CVE-2023-7250
A flaw was found in iperf, a utility for testing network performance using TCP, UDP, and SCTP. A malicious or malfunctioning client can send less than the expected amount of data to the iperf server, which can cause the server to hang indefinitely waiting for the remainder or until the connection gets closed. This will prevent other connections to the server, leading to a denial of service.
CVE-2023-7250
A flaw was found in iperf, a utility for testing network performance using TCP, UDP, and SCTP. A malicious or malfunctioning client can send less than the expected amount of data to the iperf server, which can cause the server to hang indefinitely waiting for the remainder or until the connection gets closed. This will prevent other connections to the server, leading to a denial of service.
CVE-2023-7250
A flaw was found in iperf, a utility for testing network performance using TCP, UDP, and SCTP. A malicious or malfunctioning client can send less than the expected amount of data to the iperf server, which can cause the server to hang indefinitely waiting for the remainder or until the connection gets closed. This will prevent other connections to the server, leading to a denial of service.
CVE-2023-7250
Iperf3: possible denial of service
CVE-2023-7250
A flaw was found in iperf, a utility for testing network performance u ...
CVE-2024-26306
iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario.
CVE-2024-26306
iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario.
CVE-2024-26306
iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario.
CVE-2024-26306
CVE-2024-26306
iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server wi ...
ROS-20240422-07
Уязвимость iperf3
GHSA-g636-8hgg-7gx9
A flaw was found in iperf, a utility for testing network performance using TCP, UDP, and SCTP. A malicious or malfunctioning client can send less than the expected amount of data to the iperf server, which can cause the server to hang indefinitely waiting for the remainder or until the connection gets closed. This will prevent other connections to the server, leading to a denial of service.
BDU:2024-03238
Уязвимость инструмента измерения пропускной способности сети Iperf3, связанная с разрешенными списками входных данных, позволяющая нарушителю вызвать отказ в обслуживании
SUSE-SU-2024:1981-1
Security update for iperf
ROS-20240611-06
Уязвимость iperf3
GHSA-x8qh-8j65-v4j9
iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
RLSA-2024:9185 Moderate: iperf3 security update | 8 месяцев назад | |||
RLSA-2024:4241 Moderate: iperf3 security update | 6 месяцев назад | |||
ELSA-2024-9185 ELSA-2024-9185: iperf3 security update (MODERATE) | 12 месяцев назад | |||
ELSA-2024-4241 ELSA-2024-4241: iperf3 security update (MODERATE) | больше 1 года назад | |||
CVE-2023-7250 A flaw was found in iperf, a utility for testing network performance using TCP, UDP, and SCTP. A malicious or malfunctioning client can send less than the expected amount of data to the iperf server, which can cause the server to hang indefinitely waiting for the remainder or until the connection gets closed. This will prevent other connections to the server, leading to a denial of service. | CVSS3: 5.3 | 0% Низкий | больше 1 года назад | |
CVE-2023-7250 A flaw was found in iperf, a utility for testing network performance using TCP, UDP, and SCTP. A malicious or malfunctioning client can send less than the expected amount of data to the iperf server, which can cause the server to hang indefinitely waiting for the remainder or until the connection gets closed. This will prevent other connections to the server, leading to a denial of service. | CVSS3: 5.3 | 0% Низкий | около 2 лет назад | |
CVE-2023-7250 A flaw was found in iperf, a utility for testing network performance using TCP, UDP, and SCTP. A malicious or malfunctioning client can send less than the expected amount of data to the iperf server, which can cause the server to hang indefinitely waiting for the remainder or until the connection gets closed. This will prevent other connections to the server, leading to a denial of service. | CVSS3: 5.3 | 0% Низкий | больше 1 года назад | |
CVE-2023-7250 Iperf3: possible denial of service | CVSS3: 5.3 | 0% Низкий | больше 1 года назад | |
CVE-2023-7250 A flaw was found in iperf, a utility for testing network performance u ... | CVSS3: 5.3 | 0% Низкий | больше 1 года назад | |
CVE-2024-26306 iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario. | CVSS3: 5.9 | 1% Низкий | больше 1 года назад | |
CVE-2024-26306 iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario. | CVSS3: 5.9 | 1% Низкий | больше 1 года назад | |
CVE-2024-26306 iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario. | CVSS3: 5.9 | 1% Низкий | больше 1 года назад | |
CVSS3: 5.9 | 1% Низкий | больше 1 года назад | ||
CVE-2024-26306 iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server wi ... | CVSS3: 5.9 | 1% Низкий | больше 1 года назад | |
ROS-20240422-07 Уязвимость iperf3 | CVSS3: 5.3 | 0% Низкий | больше 1 года назад | |
GHSA-g636-8hgg-7gx9 A flaw was found in iperf, a utility for testing network performance using TCP, UDP, and SCTP. A malicious or malfunctioning client can send less than the expected amount of data to the iperf server, which can cause the server to hang indefinitely waiting for the remainder or until the connection gets closed. This will prevent other connections to the server, leading to a denial of service. | CVSS3: 5.3 | 0% Низкий | больше 1 года назад | |
BDU:2024-03238 Уязвимость инструмента измерения пропускной способности сети Iperf3, связанная с разрешенными списками входных данных, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.3 | 0% Низкий | больше 1 года назад | |
SUSE-SU-2024:1981-1 Security update for iperf | 1% Низкий | больше 1 года назад | ||
ROS-20240611-06 Уязвимость iperf3 | CVSS3: 5.9 | 1% Низкий | больше 1 года назад | |
GHSA-x8qh-8j65-v4j9 iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario. | CVSS3: 5.9 | 1% Низкий | больше 1 года назад |
Уязвимостей на страницу