The sflow decode package prior to version 3.4.4 does not employ sufficient packet sanitisation which can lead to a denial of service attack. Attackers can craft malformed packets causing the process to consume huge amounts of memory resulting in a denial of service.
github.com/cloudflare/goflow/v3/decoders/sflow
Version 3.4.4 contains patches fixing this.
A possible workaround is to not have your goflow collector publicly reachable.
If you have any questions or comments about this advisory: * Open an issue in goflow repo * Email us netdev[@]cloudflare.com
{
"nvd_published_at": "2022-09-30T11:15:00Z",
"github_reviewed": true,
"cwe_ids": [
"CWE-20",
"CWE-400"
],
"github_reviewed_at": "2022-10-01T15:52:23Z",
"severity": "HIGH"
}