An issue was discovered in FastNetMon Community Edition through 1.2.7. The sFlow v5 plugin allows remote attackers to cause a denial of service (application crash) via a crafted packet that specifies many sFlow samples.
[
{
"target": {
"file": "src/sflow_plugin/sflow_collector.cpp",
"function": "parse_sflow_v5_packet"
},
"digest": {
"length": 2026.0,
"function_hash": "92040754092628088137376204904776516884"
},
"signature_version": "v1",
"source": "https://github.com/pavel-odintsov/fastnetmon/commit/5164a29603fff9dd445b7660a35090989f005000",
"id": "CVE-2024-56072-22ab8b2e",
"deprecated": false,
"signature_type": "Function"
},
{
"target": {
"file": "src/libsflow/libsflow.hpp"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"319101499062127304267788999493356221706",
"306294952687957480174959036984179319172",
"55083860268450550537350289088260489058"
]
},
"signature_version": "v1",
"source": "https://github.com/pavel-odintsov/fastnetmon/commit/5164a29603fff9dd445b7660a35090989f005000",
"id": "CVE-2024-56072-42b2ed17",
"deprecated": false,
"signature_type": "Line"
}
]