CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS
Percentile
69.2%
An exploitable information disclosure vulnerability exists in the network
packet handling functionality of Shadowsocks-libev 3.3.2. When utilizing a
Stream Cipher, a specially crafted set of network packets can cause an
outbound connection from the server, resulting in information disclosure.
An attacker can send arbitrary packets to trigger this vulnerability.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | shadowsocks-libev | < any | UNKNOWN |
ubuntu | 20.04 | noarch | shadowsocks-libev | < any | UNKNOWN |
ubuntu | 22.04 | noarch | shadowsocks-libev | < any | UNKNOWN |
ubuntu | 24.04 | noarch | shadowsocks-libev | < any | UNKNOWN |
github.com/shadowsocks/shadowsocks-libev/issues/2525
github.com/shadowsocks/shadowsocks-libev/issues/2525#issuecomment-557551274
launchpad.net/bugs/cve/CVE-2019-5152
nvd.nist.gov/vuln/detail/CVE-2019-5152
security-tracker.debian.org/tracker/CVE-2019-5152
talosintelligence.com/vulnerability_reports/TALOS-2019-0942
www.cve.org/CVERecord?id=CVE-2019-5152
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS
Percentile
69.2%