SB2024123084 - Debian update for fastnetmon
Published: December 30, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2024-56072)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in sFlow v5 plugin within the parse_sflow_v5_packet() function in src/sflow_plugin/sflow_collector.cpp. A remote attacker can send specially crafted packet that specifies many sFlow samples and perform a denial of service (DoS) attack.
2) Division by zero (CVE-ID: CVE-2024-56073)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a divide by zero error when handling zero-length templates for Netflow v9 within the process_netflow_v9_options_template() function in src/netflow_plugin/netflow_v9_collector.cpp. A remote attacker can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.