An issue was discovered in FastNetMon Community Edition through 1.2.7. The sFlow v5 plugin allows remote attackers to cause a denial of service (application crash) via a crafted packet that specifies many sFlow samples.
{ "binaries": [ { "binary_name": "fastnetmon", "binary_version": "1.1.3+dfsg-6build1" } ] }
{ "binaries": [ { "binary_name": "fastnetmon", "binary_version": "1.1.4-1build5" } ] }
{ "binaries": [ { "binary_name": "fastnetmon", "binary_version": "1.2.6-1build4" } ] }
{ "binaries": [ { "binary_name": "fastnetmon", "binary_version": "1.2.8+git20250911-1" } ] }
{ "binaries": [ { "binary_name": "fastnetmon", "binary_version": "1.2.8-1build1" } ] }