{"id":"MGASA-2016-0235","summary":"Updated iperf packages fix security vulnerability","details":"A malicious process can connect to an iperf server and, by sending a\nmalformed message on the control channel, corrupt the server process's\nheap area.  This can lead to a crash (and a denial of service), or\ntheoretically a remote code execution as the user running the iperf\nserver.  A malicious iperf server could potentially mount a similar\nattack on an iperf client (CVE-2016-4303).\n","modified":"2026-02-01T03:14:49.329175Z","published":"2016-07-05T15:47:08Z","related":["CVE-2016-4303"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2016-0235.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=18743"},{"type":"REPORT","url":"https://raw.githubusercontent.com/esnet/security/master/cve-2016-4303/esnet-secadv-2016-0001.txt.asc"},{"type":"REPORT","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/4DE6NEEUEC3XI62GE2MB2EK5BUCZ6MCP/"}],"affected":[{"package":{"name":"iperf","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/iperf?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.0.12-1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2016-0235.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}