Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2023-7250 | First vendor Publication | 2024-03-18 |
Vendor | Cve | Last vendor Modification | 2024-03-18 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : | |||
---|---|---|---|
Cvss Base Score | N/A | Attack Range | N/A |
Cvss Impact Score | N/A | Attack Complexity | N/A |
Cvss Expoit Score | N/A | Authentication | N/A |
Calculate full CVSS 2.0 Vectors scores |
Detail
A flaw was found in iperf, a utility for testing network performance using TCP, UDP, and SCTP. A malicious or malfunctioning client can send less than the expected amount of data to the iperf server, which can cause the server to hang indefinitely waiting for the remainder or until the connection gets closed. This will prevent other connections to the server, leading to a denial of service. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7250 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-183 | Permissive Whitelist |
Sources (Detail)
Source | Url |
---|
Alert History
Date | Informations |
---|---|
2024-03-18 21:27:28 |
|
2024-03-18 17:27:28 |
|