Upstream information

CVE-2017-15924 at MITRE

Description

In manager.c in ss-manager in shadowsocks-libev 3.1.0, improper parsing allows command injection via shell metacharacters in a JSON configuration request received via 127.0.0.1 UDP traffic, related to the add_server, build_config, and construct_command_line functions.

SUSE information

Overall state of this security issue: Does not affect SUSE products

This issue is currently rated as having important severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 7.2
Vector AV:L/AC:L/Au:N/C:C/I:C/A:C
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete
SUSE Bugzilla entry: 1065619 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
openSUSE Leap 42.3
  • shadowsocks-libev >= 2.5.6-3.1
  • shadowsocks-libev-debuginfo >= 2.5.6-3.1
  • shadowsocks-libev-debugsource >= 2.5.6-3.1
  • shadowsocks-libev-devel >= 2.5.6-3.1
  • shadowsocks-libev-doc >= 2.5.6-3.1
Patchnames:
openSUSE-2017-1274