Количество 20
Количество 20

RLSA-2024:4241
Moderate: iperf3 security update
ELSA-2024-9185
ELSA-2024-9185: iperf3 security update (MODERATE)
ELSA-2024-4241
ELSA-2024-4241: iperf3 security update (MODERATE)

CVE-2023-7250
A flaw was found in iperf, a utility for testing network performance using TCP, UDP, and SCTP. A malicious or malfunctioning client can send less than the expected amount of data to the iperf server, which can cause the server to hang indefinitely waiting for the remainder or until the connection gets closed. This will prevent other connections to the server, leading to a denial of service.

CVE-2023-7250
A flaw was found in iperf, a utility for testing network performance using TCP, UDP, and SCTP. A malicious or malfunctioning client can send less than the expected amount of data to the iperf server, which can cause the server to hang indefinitely waiting for the remainder or until the connection gets closed. This will prevent other connections to the server, leading to a denial of service.

CVE-2023-7250
A flaw was found in iperf, a utility for testing network performance using TCP, UDP, and SCTP. A malicious or malfunctioning client can send less than the expected amount of data to the iperf server, which can cause the server to hang indefinitely waiting for the remainder or until the connection gets closed. This will prevent other connections to the server, leading to a denial of service.

CVE-2023-7250
CVE-2023-7250
A flaw was found in iperf, a utility for testing network performance u ...

CVE-2024-26306
iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario.

CVE-2024-26306
iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario.

CVE-2024-26306
iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario.

CVE-2024-26306
CVE-2024-26306
iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server wi ...

ROS-20240422-07
Уязвимость iperf3
GHSA-g636-8hgg-7gx9
A flaw was found in iperf, a utility for testing network performance using TCP, UDP, and SCTP. A malicious or malfunctioning client can send less than the expected amount of data to the iperf server, which can cause the server to hang indefinitely waiting for the remainder or until the connection gets closed. This will prevent other connections to the server, leading to a denial of service.

BDU:2024-03238
Уязвимость инструмента измерения пропускной способности сети Iperf3, связанная с разрешенными списками входных данных, позволяющая нарушителю вызвать отказ в обслуживании

SUSE-SU-2024:1981-1
Security update for iperf

ROS-20240611-06
Уязвимость iperf3
GHSA-x8qh-8j65-v4j9
iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario.

BDU:2024-04484
Уязвимость компонента OpenSSL Handler инструмента измерения пропускной способности сети Iperf3, позволяющая нарушителю получить доступ к конфиденциальной информации
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | RLSA-2024:4241 Moderate: iperf3 security update | около 1 месяца назад | ||
ELSA-2024-9185 ELSA-2024-9185: iperf3 security update (MODERATE) | 7 месяцев назад | |||
ELSA-2024-4241 ELSA-2024-4241: iperf3 security update (MODERATE) | 12 месяцев назад | |||
![]() | CVE-2023-7250 A flaw was found in iperf, a utility for testing network performance using TCP, UDP, and SCTP. A malicious or malfunctioning client can send less than the expected amount of data to the iperf server, which can cause the server to hang indefinitely waiting for the remainder or until the connection gets closed. This will prevent other connections to the server, leading to a denial of service. | CVSS3: 5.3 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-7250 A flaw was found in iperf, a utility for testing network performance using TCP, UDP, and SCTP. A malicious or malfunctioning client can send less than the expected amount of data to the iperf server, which can cause the server to hang indefinitely waiting for the remainder or until the connection gets closed. This will prevent other connections to the server, leading to a denial of service. | CVSS3: 5.3 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-7250 A flaw was found in iperf, a utility for testing network performance using TCP, UDP, and SCTP. A malicious or malfunctioning client can send less than the expected amount of data to the iperf server, which can cause the server to hang indefinitely waiting for the remainder or until the connection gets closed. This will prevent other connections to the server, leading to a denial of service. | CVSS3: 5.3 | 0% Низкий | больше 1 года назад |
![]() | CVSS3: 5.3 | 0% Низкий | около 1 года назад | |
CVE-2023-7250 A flaw was found in iperf, a utility for testing network performance u ... | CVSS3: 5.3 | 0% Низкий | больше 1 года назад | |
![]() | CVE-2024-26306 iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario. | CVSS3: 5.9 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-26306 iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario. | CVSS3: 5.9 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-26306 iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario. | CVSS3: 5.9 | 0% Низкий | около 1 года назад |
![]() | CVSS3: 5.9 | 0% Низкий | около 1 года назад | |
CVE-2024-26306 iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server wi ... | CVSS3: 5.9 | 0% Низкий | около 1 года назад | |
![]() | ROS-20240422-07 Уязвимость iperf3 | CVSS3: 5.3 | 0% Низкий | около 1 года назад |
GHSA-g636-8hgg-7gx9 A flaw was found in iperf, a utility for testing network performance using TCP, UDP, and SCTP. A malicious or malfunctioning client can send less than the expected amount of data to the iperf server, which can cause the server to hang indefinitely waiting for the remainder or until the connection gets closed. This will prevent other connections to the server, leading to a denial of service. | CVSS3: 5.3 | 0% Низкий | больше 1 года назад | |
![]() | BDU:2024-03238 Уязвимость инструмента измерения пропускной способности сети Iperf3, связанная с разрешенными списками входных данных, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.3 | 0% Низкий | больше 1 года назад |
![]() | SUSE-SU-2024:1981-1 Security update for iperf | 0% Низкий | около 1 года назад | |
![]() | ROS-20240611-06 Уязвимость iperf3 | CVSS3: 5.9 | 0% Низкий | около 1 года назад |
GHSA-x8qh-8j65-v4j9 iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario. | CVSS3: 5.9 | 0% Низкий | около 1 года назад | |
![]() | BDU:2024-04484 Уязвимость компонента OpenSSL Handler инструмента измерения пропускной способности сети Iperf3, позволяющая нарушителю получить доступ к конфиденциальной информации | CVSS3: 5.9 | 0% Низкий | около 1 года назад |
Уязвимостей на страницу