CVE-2024-26306

Source
https://cve.org/CVERecord?id=CVE-2024-26306
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-26306.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-26306
Downstream
Related
Published
2024-05-14T15:08:51.197Z
Modified
2026-04-10T05:10:58.227008Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario.

References

Affected packages

Git / github.com/esnet/iperf

Affected ranges

Type
GIT
Repo
https://github.com/esnet/iperf
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "fixed": "3.17"
        }
    ]
}

Affected versions

2.*
2.0-RELEASE
2.0.1-RELEASE
2.0.2-RELEASE
2.0.3-RELEASE
2.0.4-RELEASE
3.*
3.0-ALPHA1
3.0-BETA1
3.0-BETA2
3.0-BETA3
3.0-BETA4
3.0-BETA5
3.0.1
3.0.4
3.1
3.10
3.10.1
3.11
3.12
3.13
3.14
3.15
3.16
3.16-beta1
3.1b1
3.1b2
3.1b3
3.2
3.2rc1
3.3
3.4
3.5
3.6
3.7
3.8
3.8.1
3.9
iperf-3.*
iperf-3.0a1
Other
iperf3
trunk

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-26306.json"