Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-5152

Опубликовано: 18 дек. 2019
Источник: debian

Описание

An exploitable information disclosure vulnerability exists in the network packet handling functionality of Shadowsocks-libev 3.3.2. When utilizing a Stream Cipher, a specially crafted set of network packets can cause an outbound connection from the server, resulting in information disclosure. An attacker can send arbitrary packets to trigger this vulnerability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
shadowsocks-libevunfixedpackage

Примечания

  • https://talosintelligence.com/vulnerability_reports/TALOS-2019-0942

  • https://github.com/shadowsocks/shadowsocks-libev/issues/2525

  • Upstream has no plan to remove stream ciphers as per

  • https://github.com/shadowsocks/shadowsocks-libev/issues/2525#issuecomment-557551274

  • Documented insecure use case provided for backwards compatibility.

Связанные уязвимости

CVSS3: 7.4
ubuntu
около 6 лет назад

An exploitable information disclosure vulnerability exists in the network packet handling functionality of Shadowsocks-libev 3.3.2. When utilizing a Stream Cipher, a specially crafted set of network packets can cause an outbound connection from the server, resulting in information disclosure. An attacker can send arbitrary packets to trigger this vulnerability.

CVSS3: 7.4
nvd
около 6 лет назад

An exploitable information disclosure vulnerability exists in the network packet handling functionality of Shadowsocks-libev 3.3.2. When utilizing a Stream Cipher, a specially crafted set of network packets can cause an outbound connection from the server, resulting in information disclosure. An attacker can send arbitrary packets to trigger this vulnerability.

CVSS3: 7.4
github
больше 3 лет назад

An exploitable information disclosure vulnerability exists in the network packet handling functionality of Shadowsocks-libev 3.3.2. When utilizing a Stream Cipher, a specially crafted set of network packets can cause an outbound connection from the server, resulting in information disclosure. An attacker can send arbitrary packets to trigger this vulnerability.