Описание
An exploitable code execution vulnerability exists in the ss-manager binary of Shadowsocks-libev 3.3.2. Specially crafted network packets sent to ss-manager can cause an arbitrary binary to run, resulting in code execution and privilege escalation. An attacker can send network packets to trigger this vulnerability.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| shadowsocks-libev | fixed | 3.3.3+ds-2 | package | |
| shadowsocks-libev | no-dsa | buster | package | |
| shadowsocks-libev | no-dsa | stretch | package |
Примечания
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0958
https://github.com/shadowsocks/shadowsocks-libev/issues/2537
Mitigation: Using a unix socket with ss-manager via --manager-socket.
Exposing ss-manager to pubic is always dangerous.
EPSS
Связанные уязвимости
An exploitable code execution vulnerability exists in the ss-manager binary of Shadowsocks-libev 3.3.2. Specially crafted network packets sent to ss-manager can cause an arbitrary binary to run, resulting in code execution and privilege escalation. An attacker can send network packets to trigger this vulnerability.
An exploitable code execution vulnerability exists in the ss-manager binary of Shadowsocks-libev 3.3.2. Specially crafted network packets sent to ss-manager can cause an arbitrary binary to run, resulting in code execution and privilege escalation. An attacker can send network packets to trigger this vulnerability.
An exploitable code execution vulnerability exists in the ss-manager binary of Shadowsocks-libev 3.3.2. Specially crafted network packets sent to ss-manager can cause an arbitrary binary to run, resulting in code execution and privilege escalation. An attacker can send network packets to trigger this vulnerability.
EPSS