diff --git a/advisories/unreviewed/2024/12/GHSA-2w89-5px3-fvx6/GHSA-2w89-5px3-fvx6.json b/advisories/unreviewed/2024/12/GHSA-2w89-5px3-fvx6/GHSA-2w89-5px3-fvx6.json index 524f81b903e2a..094efffd2f511 100644 --- a/advisories/unreviewed/2024/12/GHSA-2w89-5px3-fvx6/GHSA-2w89-5px3-fvx6.json +++ b/advisories/unreviewed/2024/12/GHSA-2w89-5px3-fvx6/GHSA-2w89-5px3-fvx6.json @@ -1,14 +1,37 @@ { "schema_version": "1.4.0", "id": "GHSA-2w89-5px3-fvx6", - "modified": "2024-12-19T00:37:35Z", + "modified": "2024-12-19T00:37:36Z", "published": "2024-12-19T00:37:35Z", "aliases": [ "CVE-2024-53580" ], - "details": "iperf v3.17.1 was discovered to contain a segmentation violation via the iperf_exchange_parameters() function.", - "severity": [], - "affected": [], + "summary": "iperf: JSON Type Confusion Leads to DoS ", + "details": "A segmentation fault vulnerability in iperf (up to v3.17.1) can cause a Denial of Service condition when processing malformed JSON data, affecting both Linux and Windows versions.", + "severity": [ + + ], + "affected": [ + { + "package": { + "ecosystem": "Go", + "name": "https://github.com/esnet/iperf" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "3.18" + } + ] + } + ] + } + ], "references": [ { "type": "ADVISORY", @@ -24,8 +47,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-20" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-12-18T23:15:17Z"