[arch-security] [ASA-201711-40] shadowsocks-libev: arbitrary command execution

Levente Polyak anthraxx at archlinux.org
Fri Dec 1 20:26:42 UTC 2017


Arch Linux Security Advisory ASA-201711-40
==========================================

Severity: High
Date    : 2017-11-30
CVE-ID  : CVE-2017-15924
Package : shadowsocks-libev
Type    : arbitrary command execution
Remote  : No
Link    : https://security.archlinux.org/AVG-474

Summary
=======

The package shadowsocks-libev before version 3.1.1-1 is vulnerable to
arbitrary command execution.

Resolution
==========

Upgrade to 3.1.1-1.

# pacman -Syu "shadowsocks-libev>=3.1.1-1"

The problem has been fixed upstream in version 3.1.1.

Workaround
==========

None.

Description
===========

In manager.c in ss-manager in shadowsocks-libev before 3.1.1, improper
parsing allows command injection via shell metacharacters in a JSON
configuration request received via 127.0.0.1 UDP traffic, related to
the add_server, build_config, and construct_command_line functions.

Impact
======

A local attacker could send a specially crafted configuration request
to localhost that, when processed by ss-manager, leads to the execution
of arbitrary commands as the user running ss-manager.

References
==========

http://openwall.com/lists/oss-security/2017/10/13/2
https://github.com/shadowsocks/shadowsocks-libev/commit/c67d275803dc6ea22c558d06b1f7ba9f94cd8de3
https://github.com/shadowsocks/shadowsocks-libev/issues/1734
https://www.x41-dsec.de/lab/advisories/x41-2017-010-shadowsocks-libev/
https://security.archlinux.org/CVE-2017-15924

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 866 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20171201/b9c67c0f/attachment.asc>


More information about the arch-security mailing list