CVE-2023-7250

A flaw was found in iperf, a utility for testing network performance using TCP, UDP, and SCTP. A malicious or malfunctioning client can send less than the expected amount of data to the iperf server, which can cause the server to hang indefinitely waiting for the remainder or until the connection gets closed. This will prevent other connections to the server, leading to a denial of service.
Configurations

Configuration 1 (hide)

cpe:2.3:a:es:iperf3:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0_aarch64:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0_aarch64:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0_ppc64le:*:*:*:*:*:*:*

History

07 Apr 2025, 16:57

Type Values Removed Values Added
First Time Redhat enterprise Linux For Ibm Z Systems
Redhat enterprise Linux For Power Little Endian
Redhat
Es iperf3
Es
Redhat enterprise Linux
Redhat enterprise Linux For Arm 64
CPE cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:a:es:iperf3:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0_aarch64:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0_ppc64le:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0_aarch64:*:*:*:*:*:*:*
References () https://access.redhat.com/errata/RHSA-2024:4241 - () https://access.redhat.com/errata/RHSA-2024:4241 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2024:9185 - () https://access.redhat.com/errata/RHSA-2024:9185 - Third Party Advisory
References () https://access.redhat.com/security/cve/CVE-2023-7250 - () https://access.redhat.com/security/cve/CVE-2023-7250 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2244707 - () https://bugzilla.redhat.com/show_bug.cgi?id=2244707 - Issue Tracking, Third Party Advisory

21 Nov 2024, 08:45

Type Values Removed Values Added
References () https://access.redhat.com/errata/RHSA-2024:4241 - () https://access.redhat.com/errata/RHSA-2024:4241 -
References () https://access.redhat.com/security/cve/CVE-2023-7250 - () https://access.redhat.com/security/cve/CVE-2023-7250 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=2244707 - () https://bugzilla.redhat.com/show_bug.cgi?id=2244707 -

12 Nov 2024, 17:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:9185 -

02 Jul 2024, 23:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:4241 -

18 Mar 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-18 13:15

Updated : 2025-04-07 16:57


NVD link : CVE-2023-7250

Mitre link : CVE-2023-7250

CVE.ORG link : CVE-2023-7250


JSON object : View

Products Affected

redhat

  • enterprise_linux_for_ibm_z_systems
  • enterprise_linux_for_power_little_endian
  • enterprise_linux_for_arm_64
  • enterprise_linux

es

  • iperf3
CWE
CWE-183

Permissive List of Allowed Inputs