Risk | High |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2019-5164 |
CWE-ID | CWE-306 |
Exploitation vector | Network |
Public exploit | Public exploit code for vulnerability #1 is available. |
Vulnerable software |
shadowsocks-libev (Alpine package) Operating systems & Components / Operating system package or component |
Vendor | Alpine Linux Development Team |
Security Bulletin
This security bulletin contains one high risk vulnerability.
EUVDB-ID: #VU23393
Risk: High
CVSSv4.0: 7.4 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Amber]
CVE-ID: CVE-2019-5164
CWE-ID:
CWE-306 - Missing Authentication for Critical Function
Exploit availability: No
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to an insufficient authentication mechanism in the ss-manager binary. A remote authenticated attacker can send a specially crafted network packets to ss-manager, cause an arbitrary binary to run and execute arbitrary code on the target system.
Install update from vendor's website.
Vulnerable software versionsshadowsocks-libev (Alpine package): 3.3.3-r0
CPE2.3 External linkshttps://git.alpinelinux.org/aports/commit/?id=755223c71bf078255de03b9fec39b92a892e92d1
https://git.alpinelinux.org/aports/commit/?id=1055ea1aafc9870c2cdfef42f1e6998f5e6aff25
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.