An exploitable code execution vulnerability exists in the ss-manager binary of Shadowsocks-libev 3.3.2. Specially crafted network packets sent to ss-manager can cause an arbitrary binary to run, resulting in code execution and privilege escalation. An attacker can send network packets to trigger this vulnerability.
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Link | Tags |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00023.html | mailing list third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00061.html | mailing list third party advisory vendor advisory |
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0958 | exploit third party advisory mitigation |