First published: Tue Dec 03 2019(Updated: )
An exploitable code execution vulnerability exists in the ss-manager binary of Shadowsocks-libev 3.3.2. Specially crafted network packets sent to ss-manager can cause an arbitrary binary to run, resulting in code execution and privilege escalation. An attacker can send network packets to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Shadowsocks Shadowsocks-libev | =3.3.2 | |
openSUSE Backports SLE | =15.0-sp1 | |
openSUSE Leap | =15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this exploit is CVE-2019-5164.
The severity of CVE-2019-5164 is high with a severity value of 7.8.
Shadowsocks-libev version 3.3.2 is affected by CVE-2019-5164.
CVE-2019-5164 allows an attacker to execute arbitrary code and escalate privileges by sending specially crafted network packets to the ss-manager binary of Shadowsocks-libev.
To fix CVE-2019-5164, users should update to a patched version of Shadowsocks-libev or apply the necessary security patches provided by the vendor.