The sflow decode package prior to version 3.4.4 does not employ sufficient packet sanitisation which can lead to a denial of service attack. Attackers can craft malformed packets causing the process to consume huge amounts of memory resulting in a denial of service.
github.com/cloudflare/goflow/v3/decoders/sflow
Version 3.4.4 contains patches fixing this.
A possible workaround is to not have your goflow collector publicly reachable.
If you have any questions or comments about this advisory: * Open an issue in goflow repo * Email us netdev[@]cloudflare.com
{ "nvd_published_at": "2022-09-30T11:15:00Z", "cwe_ids": [ "CWE-20", "CWE-400" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2022-10-01T15:52:23Z" }