CVE-2024-25398

7.5 HIGH

📋 TL;DR

Srelay v0.4.8p3 contains a vulnerability where specially crafted network payloads can trigger a denial of service condition, causing the SOCKS proxy service to crash or become unresponsive. This affects anyone running the vulnerable version of Srelay as a SOCKS proxy or relay service. The vulnerability allows attackers to disrupt proxy services without authentication.

💻 Affected Systems

Products:
  • Srelay (SOCKS proxy and Relay)
Versions: v0.4.8p3
Operating Systems: Linux, Unix-like systems
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of Srelay v0.4.8p3 are vulnerable regardless of configuration. The vulnerability is in the core network handling code.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption of the SOCKS proxy, affecting all clients relying on the proxy for network connectivity, potentially causing cascading failures in dependent systems.

🟠

Likely Case

Service crashes requiring manual restart, causing temporary loss of proxy functionality for connected clients until service is restored.

🟢

If Mitigated

Minimal impact if service is behind network filtering or rate limiting that blocks malicious payloads before they reach the vulnerable service.

🌐 Internet-Facing: HIGH - Internet-facing Srelay instances are directly exposed to attack from any remote attacker without authentication requirements.
🏢 Internal Only: MEDIUM - Internal instances are still vulnerable but require attacker access to the internal network, reducing the attack surface.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The exploit writeup demonstrates a working proof-of-concept. The attack requires sending specially crafted network packets to the vulnerable service.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch is available. Consider upgrading to a newer version if available, or implement workarounds and monitoring.

🔧 Temporary Workarounds

Network Filtering

linux

Implement network filtering to block malicious payloads before they reach Srelay

iptables -A INPUT -p tcp --dport [srelay_port] -m string --string "malicious_pattern" --algo bm -j DROP

Rate Limiting

linux

Apply rate limiting to reduce impact of DoS attempts

iptables -A INPUT -p tcp --dport [srelay_port] -m limit --limit 10/min --limit-burst 20 -j ACCEPT

🧯 If You Can't Patch

  • Implement network segmentation to isolate Srelay from untrusted networks
  • Deploy intrusion detection/prevention systems to monitor for exploit attempts

🔍 How to Verify

Check if Vulnerable:

Check Srelay version: srelay -v or examine installed package version

Check Version:

srelay -v 2>&1 | grep -i version

Verify Fix Applied:

Since no patch is available, verify workarounds are in place and monitor for service stability

📡 Detection & Monitoring

Log Indicators:

  • Srelay service crashes
  • Unexpected termination logs
  • Connection resets from specific sources

Network Indicators:

  • Unusual traffic patterns to Srelay port
  • Multiple connection attempts with malformed packets

SIEM Query:

source="srelay.log" AND ("crash" OR "segmentation fault" OR "terminated unexpectedly")

🔗 References

📤 Share & Export