SB2024123084 - Debian update for fastnetmon



SB2024123084 - Debian update for fastnetmon

Published: December 30, 2024

Security Bulletin ID SB2024123084
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Input validation error (CVE-ID: CVE-2024-56072)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in sFlow v5 plugin within the parse_sflow_v5_packet() function in src/sflow_plugin/sflow_collector.cpp. A remote attacker can send  specially crafted packet that specifies many sFlow samples and perform a denial of service (DoS) attack.


2) Division by zero (CVE-ID: CVE-2024-56073)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a divide by zero error when handling zero-length templates for Netflow v9 within the process_netflow_v9_options_template() function in src/netflow_plugin/netflow_v9_collector.cpp. A remote attacker can perform a denial of service (DoS) attack.


Remediation

Install update from vendor's website.