Lucene search

K
githubGitHub Advisory DatabaseGHSA-9RPW-2H95-666C
HistoryOct 01, 2022 - 3:52 p.m.

Cloudflare GoFlow vulnerable to a Denial of Service in the sflow packet handling package

2022-10-0115:52:23
CWE-20
CWE-400
GitHub Advisory Database
github.com
14
cloudflare
goflow
sflow
vulnerability
denial of service
packet handling
patch
version 3.4.4

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

38.4%

Impact

The sflow decode package prior to version 3.4.4 does not employ sufficient packet sanitisation which can lead to a denial of service attack. Attackers can craft malformed packets causing the process to consume huge amounts of memory resulting in a denial of service.

Specific Go Packages Affected

github.com/cloudflare/goflow/v3/decoders/sflow

Patches

Version 3.4.4 contains patches fixing this.

Workarounds

A possible workaround is to not have your goflow collector publicly reachable.

For more information

If you have any questions or comments about this advisory:

Affected configurations

Vulners
Node
cloudflaregoflowRange<3.4.4
VendorProductVersionCPE
cloudflaregoflow*cpe:2.3:a:cloudflare:goflow:*:*:*:*:*:*:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

38.4%

Related for GHSA-9RPW-2H95-666C