Vulnerability Details : CVE-2023-38403
iperf3 before 3.14 allows peers to cause an integer overflow and heap corruption via a crafted length field.
Vulnerability category: Overflow
Products affected by CVE-2023-38403
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
- cpe:2.3:o:apple:macos:14.0:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:clustered_data_ontap:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
- cpe:2.3:a:es:iperf3:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-38403
0.42%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 74 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-38403
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2023-38403
-
The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-38403
-
https://github.com/esnet/iperf/commit/0ef151550d96cc4460f98832df84b4a1e87c65e9
Fix memory allocation hazard (#1542). (#1543) · esnet/iperf@0ef1515 · GitHubPatch
-
http://seclists.org/fulldisclosure/2023/Oct/24
Full Disclosure: APPLE-SA-10-25-2023-4 macOS Sonoma 14.1Mailing List;Third Party Advisory
-
https://support.apple.com/kb/HT213985
About the security content of macOS Ventura 13.6.1 - Apple SupportRelease Notes;Third Party Advisory
-
https://security.netapp.com/advisory/ntap-20230818-0016/
CVE-2023-38403 Debian Vulnerability in NetApp Products | NetApp Product SecurityThird Party Advisory
-
http://seclists.org/fulldisclosure/2023/Oct/26
Full Disclosure: APPLE-SA-10-25-2023-5 macOS Ventura 13.6.1Mailing List;Third Party Advisory
-
https://support.apple.com/kb/HT213984
About the security content of macOS Sonoma 14.1 - Apple SupportRelease Notes;Third Party Advisory
-
https://bugs.debian.org/1040830
#1040830 - ESNET-SECADV-2023-0001: iperf3 memory allocation hazard and crash - Debian Bug report logsThird Party Advisory
-
https://downloads.es.net/pub/iperf/esnet-secadv-2023-0001.txt.asc
Vendor Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BV6EBWWF4PEQKROEVXGYSTIT2MGBTLU7/
[SECURITY] Fedora 38 Update: iperf3-3.14-1.fc38 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BV6EBWWF4PEQKROEVXGYSTIT2MGBTLU7/
[SECURITY] Fedora 38 Update: iperf3-3.14-1.fc38 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://cwe.mitre.org/data/definitions/130.html
CWE - CWE-130: Improper Handling of Length Parameter Inconsistency (4.12)Third Party Advisory
-
https://github.com/esnet/iperf/issues/1542
DoS on sending invalid length in iperf_api.c+2684 · Issue #1542 · esnet/iperf · GitHubIssue Tracking;Vendor Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M25Z5FHTO3XWMGP37JHJ7IIIHSGCLKEV/
[SECURITY] Fedora 37 Update: iperf3-3.14-1.fc37 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M25Z5FHTO3XWMGP37JHJ7IIIHSGCLKEV/
[SECURITY] Fedora 37 Update: iperf3-3.14-1.fc37 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2023/07/msg00025.html
[SECURITY] [DLA 3506-1] iperf3 security updateMailing List;Third Party Advisory
Jump to