[manjaro-security] [arch-security] [ASA-201711-40] shadowsocks-libev: arbitrary command execution
Levente Polyak via arch-security
arch-security at archlinux.org
Fri Dec 1 21:26:42 CET 2017
Arch Linux Security Advisory ASA-201711-40
Date : 2017-11-30
CVE-ID : CVE-2017-15924
Package : shadowsocks-libev
Type : arbitrary command execution
Remote : No
Link : https://security.archlinux.org/AVG-474
The package shadowsocks-libev before version 3.1.1-1 is vulnerable to
arbitrary command execution.
Upgrade to 3.1.1-1.
# pacman -Syu "shadowsocks-libev>=3.1.1-1"
The problem has been fixed upstream in version 3.1.1.
In manager.c in ss-manager in shadowsocks-libev before 3.1.1, improper
parsing allows command injection via shell metacharacters in a JSON
configuration request received via 127.0.0.1 UDP traffic, related to
the add_server, build_config, and construct_command_line functions.
A local attacker could send a specially crafted configuration request
to localhost that, when processed by ss-manager, leads to the execution
of arbitrary commands as the user running ss-manager.
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 866 bytes
Desc: OpenPGP digital signature
More information about the manjaro-security