An issue was discovered in FastNetMon Community Edition through 1.2.7. The sFlow v5 plugin allows remote attackers to cause a denial of service (application crash) via a crafted packet that specifies many sFlow samples.
{ "binaries": [ { "binary_version": "1.1.3+dfsg-6build1", "binary_name": "fastnetmon" } ] }
{ "binaries": [ { "binary_version": "1.1.4-1build5", "binary_name": "fastnetmon" } ] }
{ "binaries": [ { "binary_version": "1.2.6-1build4", "binary_name": "fastnetmon" } ] }
{ "binaries": [ { "binary_version": "1.2.8-1build1", "binary_name": "fastnetmon" } ] }