An exploitable code execution vulnerability exists in the ss-manager binary of Shadowsocks-libev 3.3.2. Specially crafted network packets sent to ss-manager can cause an arbitrary binary to run, resulting in code execution and privilege escalation. An attacker can send network packets to trigger this vulnerability.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "3.3.3+ds-3", "binary_name": "libshadowsocks-libev-dev" }, { "binary_version": "3.3.3+ds-3", "binary_name": "libshadowsocks-libev2" }, { "binary_version": "3.3.3+ds-3", "binary_name": "libshadowsocks-libev2-dbgsym" }, { "binary_version": "3.3.3+ds-3", "binary_name": "shadowsocks-libev" }, { "binary_version": "3.3.3+ds-3", "binary_name": "shadowsocks-libev-dbgsym" } ] }