{"id":"CVE-2024-53580","details":"iperf v3.17.1 was discovered to contain a segmentation violation via the iperf_exchange_parameters() function.","modified":"2026-04-16T04:36:02.935110794Z","published":"2024-12-18T23:15:17.010Z","related":["ALSA-2025:0161","ALSA-2025:0168","SUSE-SU-2025:0291-1","openSUSE-SU-2025:14700-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00027.html"},{"type":"ADVISORY","url":"https://github.com/esnet/iperf/releases/tag/3.18"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20250404-0009/"},{"type":"EVIDENCE","url":"https://gist.github.com/neolead/663badf2ebefefa6fe4303695e7aa7a3"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/esnet/iperf","events":[{"introduced":"0"},{"last_affected":"2acfcfe94e928e74542c9f107e02aa6dd4748a79"},{"fixed":"2a2984488d6de8f7a2d1f5938e03ca7be57e227c"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"3.17.1"}]}}],"versions":["2.0-RELEASE","2.0.1-RELEASE","2.0.2-RELEASE","2.0.3-RELEASE","2.0.4-RELEASE","3.0-ALPHA1","3.0-BETA1","3.0-BETA2","3.0-BETA3","3.0-BETA4","3.0-BETA5","3.0.1","3.0.4","3.1","3.10","3.10.1","3.11","3.12","3.13","3.14","3.15","3.16","3.16-beta1","3.17.1","3.1b1","3.1b2","3.1b3","3.2","3.2rc1","3.3","3.4","3.5","3.6","3.7","3.8","3.8.1","3.9","iperf-3.0a1","iperf3","trunk"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-53580.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}