Security update for iperf
SUSE Patch
security@suse.de
SUSE Security Team
openSUSE-SU-2016:2113-1
Final
1
1
2016-08-19T13:27:09Z
current
2016-08-19T13:27:09Z
2016-08-19T13:27:09Z
cve-database/bin/generate-cvrf.pl
2017-02-24T01:00:00Z
Security update for iperf
iperf was updated to the the following vulnerability:
- CVE-2016-4303: A malicious client could have triggered a buffer overflow / heap corruption issue by sending a specially crafted JSON string, and possibly execute arbitrary code (boo#984453)
The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
openSUSE-2016-1006
Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)
E-Mail link for openSUSE-SU-2016:2113-1
https://www.suse.com/support/security/rating/
SUSE Security Ratings
https://bugzilla.suse.com/984453
SUSE Bug 984453
https://www.suse.com/security/cve/CVE-2016-4303/
SUSE CVE CVE-2016-4303 page
SUSE Package Hub 12
iperf-3.1.3-6.1
iperf-devel-3.1.3-6.1
libiperf0-3.1.3-6.1
iperf-3.1.3-6.1 as a component of SUSE Package Hub 12
iperf-devel-3.1.3-6.1 as a component of SUSE Package Hub 12
libiperf0-3.1.3-6.1 as a component of SUSE Package Hub 12
The parse_string function in cjson.c in the cJSON library mishandles UTF8/16 strings, which allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a non-hex character in a JSON string, which triggers a heap-based buffer overflow.
CVE-2016-4303
SUSE Package Hub 12:iperf-3.1.3-6.1
SUSE Package Hub 12:iperf-devel-3.1.3-6.1
SUSE Package Hub 12:libiperf0-3.1.3-6.1
moderate
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
https://www.suse.com/security/cve/CVE-2016-4303.html
CVE-2016-4303
https://bugzilla.suse.com/984453
SUSE Bug 984453