An exploitable denial-of-service vulnerability exists in the UDPRelay functionality of Shadowsocks-libev 3.3.2. When utilizing a Stream Cipher and a local_address, arbitrary UDP packets can cause a FATAL error code path and exit. An attacker can send arbitrary UDP packets to trigger this vulnerability.
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Link | Tags |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00023.html | vendor advisory mailing list third party advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00061.html | vendor advisory mailing list third party advisory |
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0956 | third party advisory exploit |