#VU102055 Input validation error in FastNetMon - CVE-2024-56072
Published: December 30, 2024
FastNetMon
Pavel Odintsov
Description
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in sFlow v5 plugin within the parse_sflow_v5_packet() function in src/sflow_plugin/sflow_collector.cpp. A remote attacker can send specially crafted packet that specifies many sFlow samples and perform a denial of service (DoS) attack.