All the vulnerabilites related to shadowsocks - shadowsocks-libev
cve-2019-5152
Vulnerability from cvelistv5
Published
2019-12-18 14:31
Modified
2024-08-04 19:47
Severity ?
EPSS score ?
Summary
An exploitable information disclosure vulnerability exists in the network packet handling functionality of Shadowsocks-libev 3.3.2. When utilizing a Stream Cipher, a specially crafted set of network packets can cause an outbound connection from the server, resulting in information disclosure. An attacker can send arbitrary packets to trigger this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0942 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Shadowsocks |
Version: Shadowsocks-libev 3.3.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:47:56.594Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0942" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Shadowsocks", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Shadowsocks-libev 3.3.2" } ] } ], "descriptions": [ { "lang": "en", "value": "An exploitable information disclosure vulnerability exists in the network packet handling functionality of Shadowsocks-libev 3.3.2. When utilizing a Stream Cipher, a specially crafted set of network packets can cause an outbound connection from the server, resulting in information disclosure. An attacker can send arbitrary packets to trigger this vulnerability." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306: Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-19T17:34:57", "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "shortName": "talos" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0942" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "talos-cna@cisco.com", "ID": "CVE-2019-5152", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Shadowsocks", "version": { "version_data": [ { "version_value": "Shadowsocks-libev 3.3.2" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An exploitable information disclosure vulnerability exists in the network packet handling functionality of Shadowsocks-libev 3.3.2. When utilizing a Stream Cipher, a specially crafted set of network packets can cause an outbound connection from the server, resulting in information disclosure. An attacker can send arbitrary packets to trigger this vulnerability." } ] }, "impact": { "cvss": { "baseScore": 7.4, "baseSeverity": "High", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-306: Missing Authentication for Critical Function" } ] } ] }, "references": { "reference_data": [ { "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0942", "refsource": "MISC", "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0942" } ] } } } }, "cveMetadata": { "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "assignerShortName": "talos", "cveId": "CVE-2019-5152", "datePublished": "2019-12-18T14:31:56", "dateReserved": "2019-01-04T00:00:00", "dateUpdated": "2024-08-04T19:47:56.594Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-5163
Vulnerability from cvelistv5
Published
2019-12-03 21:55
Modified
2024-08-04 19:47
Severity ?
EPSS score ?
Summary
An exploitable denial-of-service vulnerability exists in the UDPRelay functionality of Shadowsocks-libev 3.3.2. When utilizing a Stream Cipher and a local_address, arbitrary UDP packets can cause a FATAL error code path and exit. An attacker can send arbitrary UDP packets to trigger this vulnerability.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00023.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00061.html | vendor-advisory, x_refsource_SUSE | |
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0956 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Shadowsocks |
Version: Shadowsocks-libev 3.3.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:47:56.616Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2019:2667", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00023.html" }, { "name": "openSUSE-SU-2020:0142", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00061.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0956" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Shadowsocks", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Shadowsocks-libev 3.3.2" } ] } ], "descriptions": [ { "lang": "en", "value": "An exploitable denial-of-service vulnerability exists in the UDPRelay functionality of Shadowsocks-libev 3.3.2. When utilizing a Stream Cipher and a local_address, arbitrary UDP packets can cause a FATAL error code path and exit. An attacker can send arbitrary UDP packets to trigger this vulnerability." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306: Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-19T17:35:02", "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "shortName": "talos" }, "references": [ { "name": "openSUSE-SU-2019:2667", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00023.html" }, { "name": "openSUSE-SU-2020:0142", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00061.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0956" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "talos-cna@cisco.com", "ID": "CVE-2019-5163", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Shadowsocks", "version": { "version_data": [ { "version_value": "Shadowsocks-libev 3.3.2" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An exploitable denial-of-service vulnerability exists in the UDPRelay functionality of Shadowsocks-libev 3.3.2. When utilizing a Stream Cipher and a local_address, arbitrary UDP packets can cause a FATAL error code path and exit. An attacker can send arbitrary UDP packets to trigger this vulnerability." } ] }, "impact": { "cvss": { "baseScore": 5.9, "baseSeverity": "Medium", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-306: Missing Authentication for Critical Function" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2019:2667", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00023.html" }, { "name": "openSUSE-SU-2020:0142", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00061.html" }, { "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0956", "refsource": "MISC", "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0956" } ] } } } }, "cveMetadata": { "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "assignerShortName": "talos", "cveId": "CVE-2019-5163", "datePublished": "2019-12-03T21:55:47", "dateReserved": "2019-01-04T00:00:00", "dateUpdated": "2024-08-04T19:47:56.616Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-5164
Vulnerability from cvelistv5
Published
2019-12-03 21:56
Modified
2024-08-04 19:47
Severity ?
EPSS score ?
Summary
An exploitable code execution vulnerability exists in the ss-manager binary of Shadowsocks-libev 3.3.2. Specially crafted network packets sent to ss-manager can cause an arbitrary binary to run, resulting in code execution and privilege escalation. An attacker can send network packets to trigger this vulnerability.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00023.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00061.html | vendor-advisory, x_refsource_SUSE | |
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0958 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Shadowsocks |
Version: Shadowsocks-libev 3.3.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:47:56.612Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2019:2667", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00023.html" }, { "name": "openSUSE-SU-2020:0142", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00061.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0958" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Shadowsocks", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Shadowsocks-libev 3.3.2" } ] } ], "descriptions": [ { "lang": "en", "value": "An exploitable code execution vulnerability exists in the ss-manager binary of Shadowsocks-libev 3.3.2. Specially crafted network packets sent to ss-manager can cause an arbitrary binary to run, resulting in code execution and privilege escalation. An attacker can send network packets to trigger this vulnerability." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306: Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-19T17:35:03", "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "shortName": "talos" }, "references": [ { "name": "openSUSE-SU-2019:2667", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00023.html" }, { "name": "openSUSE-SU-2020:0142", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00061.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0958" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "talos-cna@cisco.com", "ID": "CVE-2019-5164", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Shadowsocks", "version": { "version_data": [ { "version_value": "Shadowsocks-libev 3.3.2" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An exploitable code execution vulnerability exists in the ss-manager binary of Shadowsocks-libev 3.3.2. Specially crafted network packets sent to ss-manager can cause an arbitrary binary to run, resulting in code execution and privilege escalation. An attacker can send network packets to trigger this vulnerability." } ] }, "impact": { "cvss": { "baseScore": 7.8, "baseSeverity": "High", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-306: Missing Authentication for Critical Function" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2019:2667", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00023.html" }, { "name": "openSUSE-SU-2020:0142", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00061.html" }, { "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0958", "refsource": "MISC", "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0958" } ] } } } }, "cveMetadata": { "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "assignerShortName": "talos", "cveId": "CVE-2019-5164", "datePublished": "2019-12-03T21:56:21", "dateReserved": "2019-01-04T00:00:00", "dateUpdated": "2024-08-04T19:47:56.612Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-15924
Vulnerability from cvelistv5
Published
2017-10-27 16:00
Modified
2024-08-05 20:04
Severity ?
EPSS score ?
Summary
In manager.c in ss-manager in shadowsocks-libev 3.1.0, improper parsing allows command injection via shell metacharacters in a JSON configuration request received via 127.0.0.1 UDP traffic, related to the add_server, build_config, and construct_command_line functions.
References
▼ | URL | Tags |
---|---|---|
https://github.com/shadowsocks/shadowsocks-libev/commit/c67d275803dc6ea22c558d06b1f7ba9f94cd8de3 | x_refsource_MISC | |
https://github.com/shadowsocks/shadowsocks-libev/issues/1734 | x_refsource_MISC | |
https://www.x41-dsec.de/lab/advisories/x41-2017-010-shadowsocks-libev/ | x_refsource_MISC | |
http://www.debian.org/security/2017/dsa-4009 | vendor-advisory, x_refsource_DEBIAN | |
http://openwall.com/lists/oss-security/2017/10/13/2 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T20:04:50.644Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/shadowsocks/shadowsocks-libev/commit/c67d275803dc6ea22c558d06b1f7ba9f94cd8de3" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/shadowsocks/shadowsocks-libev/issues/1734" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.x41-dsec.de/lab/advisories/x41-2017-010-shadowsocks-libev/" }, { "name": "DSA-4009", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2017/dsa-4009" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2017/10/13/2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-10-27T00:00:00", "descriptions": [ { "lang": "en", "value": "In manager.c in ss-manager in shadowsocks-libev 3.1.0, improper parsing allows command injection via shell metacharacters in a JSON configuration request received via 127.0.0.1 UDP traffic, related to the add_server, build_config, and construct_command_line functions." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-03T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/shadowsocks/shadowsocks-libev/commit/c67d275803dc6ea22c558d06b1f7ba9f94cd8de3" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/shadowsocks/shadowsocks-libev/issues/1734" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.x41-dsec.de/lab/advisories/x41-2017-010-shadowsocks-libev/" }, { "name": "DSA-4009", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2017/dsa-4009" }, { "tags": [ "x_refsource_MISC" ], "url": "http://openwall.com/lists/oss-security/2017/10/13/2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-15924", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In manager.c in ss-manager in shadowsocks-libev 3.1.0, improper parsing allows command injection via shell metacharacters in a JSON configuration request received via 127.0.0.1 UDP traffic, related to the add_server, build_config, and construct_command_line functions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/shadowsocks/shadowsocks-libev/commit/c67d275803dc6ea22c558d06b1f7ba9f94cd8de3", "refsource": "MISC", "url": "https://github.com/shadowsocks/shadowsocks-libev/commit/c67d275803dc6ea22c558d06b1f7ba9f94cd8de3" }, { "name": "https://github.com/shadowsocks/shadowsocks-libev/issues/1734", "refsource": "MISC", "url": "https://github.com/shadowsocks/shadowsocks-libev/issues/1734" }, { "name": "https://www.x41-dsec.de/lab/advisories/x41-2017-010-shadowsocks-libev/", "refsource": "MISC", "url": "https://www.x41-dsec.de/lab/advisories/x41-2017-010-shadowsocks-libev/" }, { "name": "DSA-4009", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2017/dsa-4009" }, { "name": "http://openwall.com/lists/oss-security/2017/10/13/2", "refsource": "MISC", "url": "http://openwall.com/lists/oss-security/2017/10/13/2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-15924", "datePublished": "2017-10-27T16:00:00", "dateReserved": "2017-10-27T00:00:00", "dateUpdated": "2024-08-05T20:04:50.644Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2019-12-18 15:15
Modified
2024-11-21 04:44
Severity ?
Summary
An exploitable information disclosure vulnerability exists in the network packet handling functionality of Shadowsocks-libev 3.3.2. When utilizing a Stream Cipher, a specially crafted set of network packets can cause an outbound connection from the server, resulting in information disclosure. An attacker can send arbitrary packets to trigger this vulnerability.
References
▼ | URL | Tags | |
---|---|---|---|
talos-cna@cisco.com | https://talosintelligence.com/vulnerability_reports/TALOS-2019-0942 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://talosintelligence.com/vulnerability_reports/TALOS-2019-0942 | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
shadowsocks | shadowsocks-libev | 3.3.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:3.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6C7487D4-D438-4F80-985D-61BEF8854421", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An exploitable information disclosure vulnerability exists in the network packet handling functionality of Shadowsocks-libev 3.3.2. When utilizing a Stream Cipher, a specially crafted set of network packets can cause an outbound connection from the server, resulting in information disclosure. An attacker can send arbitrary packets to trigger this vulnerability." }, { "lang": "es", "value": "Se presenta una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n explotable en la funcionalidad de manejo de paquetes de red de Shadowsocks-libev versi\u00f3n 3.3.2. Cuando se utiliza un Cifrado de Flujo, un conjunto de paquetes de red especialmente dise\u00f1ado puede causar una conexi\u00f3n saliente del servidor, resultando en una divulgaci\u00f3n de informaci\u00f3n. Un atacante puede enviar paquetes arbitrarios para activar esta vulnerabilidad." } ], "id": "CVE-2019-5152", "lastModified": "2024-11-21T04:44:26.993", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 5.2, "source": "talos-cna@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-12-18T15:15:11.333", "references": [ { "source": "talos-cna@cisco.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0942" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0942" } ], "sourceIdentifier": "talos-cna@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "talos-cna@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-12-03 22:15
Modified
2024-11-21 04:44
Severity ?
Summary
An exploitable code execution vulnerability exists in the ss-manager binary of Shadowsocks-libev 3.3.2. Specially crafted network packets sent to ss-manager can cause an arbitrary binary to run, resulting in code execution and privilege escalation. An attacker can send network packets to trigger this vulnerability.
References
▼ | URL | Tags | |
---|---|---|---|
talos-cna@cisco.com | http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00023.html | Mailing List, Third Party Advisory | |
talos-cna@cisco.com | http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00061.html | Mailing List, Third Party Advisory | |
talos-cna@cisco.com | https://talosintelligence.com/vulnerability_reports/TALOS-2019-0958 | Exploit, Mitigation, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00023.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00061.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://talosintelligence.com/vulnerability_reports/TALOS-2019-0958 | Exploit, Mitigation, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
shadowsocks | shadowsocks-libev | 3.3.2 | |
opensuse | backports_sle | 15.0 | |
opensuse | leap | 15.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:3.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6C7487D4-D438-4F80-985D-61BEF8854421", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "40513095-7E6E-46B3-B604-C926F1BA3568", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An exploitable code execution vulnerability exists in the ss-manager binary of Shadowsocks-libev 3.3.2. Specially crafted network packets sent to ss-manager can cause an arbitrary binary to run, resulting in code execution and privilege escalation. An attacker can send network packets to trigger this vulnerability." }, { "lang": "es", "value": "Hay una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo explotable en el binario ss-manager de Shadowsocks-libev versi\u00f3n 3.3.2. Unos paquetes de red especialmente dise\u00f1ados enviados a ss-manager pueden causar que un binario arbitrario se ejecute, resultando en la ejecuci\u00f3n de c\u00f3digo y la escalada de privilegios. Un atacante puede enviar paquetes de red para activar esta vulnerabilidad." } ], "id": "CVE-2019-5164", "lastModified": "2024-11-21T04:44:28.367", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "talos-cna@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-12-03T22:15:15.433", "references": [ { "source": "talos-cna@cisco.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00023.html" }, { "source": "talos-cna@cisco.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00061.html" }, { "source": "talos-cna@cisco.com", "tags": [ "Exploit", "Mitigation", "Third Party Advisory" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0958" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00023.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00061.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mitigation", "Third Party Advisory" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0958" } ], "sourceIdentifier": "talos-cna@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "talos-cna@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-12-03 22:15
Modified
2024-11-21 04:44
Severity ?
Summary
An exploitable denial-of-service vulnerability exists in the UDPRelay functionality of Shadowsocks-libev 3.3.2. When utilizing a Stream Cipher and a local_address, arbitrary UDP packets can cause a FATAL error code path and exit. An attacker can send arbitrary UDP packets to trigger this vulnerability.
References
▼ | URL | Tags | |
---|---|---|---|
talos-cna@cisco.com | http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00023.html | Mailing List, Third Party Advisory | |
talos-cna@cisco.com | http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00061.html | Mailing List, Third Party Advisory | |
talos-cna@cisco.com | https://talosintelligence.com/vulnerability_reports/TALOS-2019-0956 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00023.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00061.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://talosintelligence.com/vulnerability_reports/TALOS-2019-0956 | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
shadowsocks | shadowsocks-libev | 3.3.2 | |
opensuse | backports | sle-15 | |
opensuse | leap | 15.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:3.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6C7487D4-D438-4F80-985D-61BEF8854421", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:backports:sle-15:sp1:*:*:*:*:*:*", "matchCriteriaId": "C84D9410-31B7-421A-AD99-8ED2E45A9BC6", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An exploitable denial-of-service vulnerability exists in the UDPRelay functionality of Shadowsocks-libev 3.3.2. When utilizing a Stream Cipher and a local_address, arbitrary UDP packets can cause a FATAL error code path and exit. An attacker can send arbitrary UDP packets to trigger this vulnerability." }, { "lang": "es", "value": "Hay una vulnerabilidad de denegaci\u00f3n de servicio explotable en la funcionalidad UDPRelay de Shadowsocks-libev versi\u00f3n 3.3.2. Cuando se utiliza un Cifrado de Flujo y un local_address, unos paquetes UDP arbitrarios pueden causar una ruta de c\u00f3digo de error FATAL y salir. Un atacante puede enviar paquetes UDP arbitrarios para activar esta vulnerabilidad." } ], "id": "CVE-2019-5163", "lastModified": "2024-11-21T04:44:28.237", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "talos-cna@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-12-03T22:15:15.370", "references": [ { "source": "talos-cna@cisco.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00023.html" }, { "source": "talos-cna@cisco.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00061.html" }, { "source": "talos-cna@cisco.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0956" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00023.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00061.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0956" } ], "sourceIdentifier": "talos-cna@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "talos-cna@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-10-27 16:29
Modified
2024-11-21 03:15
Severity ?
Summary
In manager.c in ss-manager in shadowsocks-libev 3.1.0, improper parsing allows command injection via shell metacharacters in a JSON configuration request received via 127.0.0.1 UDP traffic, related to the add_server, build_config, and construct_command_line functions.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "262748CE-0CD9-44C2-AB0F-1A294CE0AA30", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "858C9955-84A0-46A3-B59A-F6BD2C9D25F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFAD798C-521E-4521-B340-3B543F5CDB16", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "AB12F9EF-7ACC-46E2-B218-0C0E1E38BB89", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "7C350C3D-5F7F-4F4B-B8A3-B08FDAB2618A", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "8C49FC33-3806-42ED-893C-232C141E5140", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "92225501-B713-4DBD-8EBD-8D56B6AD0872", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "01559F24-751D-42C8-9648-CC604E514B64", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "E30AB75A-4553-453B-A711-7FFA6EB448FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "602BCBCB-7B57-4037-ADC0-01090B7EBC5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:1.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "4158AB78-5C3A-48E5-8B42-7103D4D95FC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "DAC3B37C-5AC7-4785-82F3-FB0D4CD4B777", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "6FBBA7A1-2183-4435-8064-2841597DBD55", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "54CBF205-2399-4661-AD93-FFCCD757A2D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "7D20FECE-568E-4991-A869-23789B18A8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "8BB2C3F3-A4DB-4C04-8F65-3C24B61E524D", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6B825E3-F934-4D1D-B307-7196C61BDA31", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "B3B8FECA-EE5C-4058-873C-F65C91642FE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "236849B1-4DAE-482C-B75E-912C1CE5F9A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "8ACBD11A-4C3E-47CA-A9CD-333318A855C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "B2340582-1281-408A-AF05-4A71E78DB847", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "06182273-F0E4-4F7E-A563-121AD2FAC441", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "0279A0FD-292B-45BC-B56A-1E12EDAACB38", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "A36328CB-2DDF-40C4-AA52-98A7B4BDBCB0", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "12C85600-1F7F-476D-B060-FBE25545300D", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "71E66FC1-612B-488C-A6D4-9E73CBD9DE82", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "3E9BAF98-48E9-4440-A492-60778999BEAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "AFA20F57-5234-43D9-B33E-6AA49A6FCBA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "20D60ABD-1D9F-4D27-9D2D-48F10AF6D4E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "D89BD126-AD55-4EF8-A48E-BA737A89F8CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "5ECDF224-ADA3-4025-9E09-E9EF3B43444F", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "F31D2E50-FB42-4082-BC86-6662D8706A50", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9C12C316-6F4C-4475-AA98-285AFC4E2B4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "2E51B2F2-1838-4A6A-96AB-EE9EEB995A77", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "21421755-6E64-4FF5-BF57-EDB768D26AD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "F4AF0932-F04A-4E8A-AFD3-52F006F85FB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6F689FB4-2B30-452D-BE8B-96DF84C00960", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "79909DAF-3264-4828-8E36-887FF5173541", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "46166314-7AAC-42D6-A676-840D5EF872D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "8E490DD4-4FD8-410E-8BD7-2B1E081A2506", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "403B82B9-53F8-4BA9-8EE8-93EC5B970DB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1BFBDE8F-0977-4917-AFF3-031C40CB9E0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "058DF5B7-AF32-48FA-8EFE-3ED1E4130C4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:2.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "4D65CEA2-205A-4527-8255-25317FFDE336", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:2.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "FBDD3327-5537-4792-9B02-13D1BC6892A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:2.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "B6A9C44E-C7FA-4364-A5B6-684A1084073E", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:2.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "FCEB57E4-A7D2-42C5-84A6-ABD50FA2B91B", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:2.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "675CBFEF-AF81-4EF4-9E18-13B41C1F89F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:2.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "5FED856A-2144-4D7D-B574-F67793DAA251", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "18A99F5F-FEDF-457A-B274-4702214ADD6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "8C2CBF01-5961-4294-A0CC-D0B274879FE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "E0043DF8-3531-4B34-A0C7-0F58F8C90667", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:2.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "62F18204-8AD4-4807-A859-410D55ABFBF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:2.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "DA8144FE-9F00-4B83-909A-9147CE8D7819", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:2.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "652369C8-9B12-409E-975F-17F3C05B4981", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:2.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "03AD1670-0B5E-419D-A29F-5230C9DD1175", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "9B030384-DB8E-469D-AAFB-4F7D9ECA5CFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "1BBBED6A-744D-4010-815F-4C1FE454B2A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:2.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "562B9AEF-8F59-4634-B4E5-AA3B447C414C", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:2.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "2B4C4BAC-756E-41EA-A13D-8AB96F1C1DD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B8E25A0F-8EA6-426C-8992-41F0065BBE9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F6E1528A-610A-4DF9-A5A2-E65DE99B8C0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "B9062913-8F01-45E8-AB15-18BAC8A71249", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "CCDDF0A6-A17D-44A7-ACE5-55E0E378BC0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "A7DA1D19-8123-4898-AAD4-3C672B7B296F", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "86EE26E9-C5D6-43BF-9882-5B1AB5F19D10", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:3.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "9C05CFCD-5136-440C-B0C2-E03D281A5A26", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:3.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "916FEC4D-DFB6-4194-960A-8EACD3C374C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:3.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "95DF4CAE-A6CD-4AC7-9376-01939ED9F19E", "vulnerable": true }, { "criteria": "cpe:2.3:a:shadowsocks:shadowsocks-libev:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "C5295170-CCB0-452A-B6B7-14CA5D2A6F0B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.2:*:*:*:*:*:*:*", "matchCriteriaId": "6911EEBB-541E-4448-B028-2F473903B24E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In manager.c in ss-manager in shadowsocks-libev 3.1.0, improper parsing allows command injection via shell metacharacters in a JSON configuration request received via 127.0.0.1 UDP traffic, related to the add_server, build_config, and construct_command_line functions." }, { "lang": "es", "value": "En manager.c en ss-manager en shadowsocks-libev 3.1.0, un an\u00e1lisis sint\u00e1ctico incorrecto permite que se inyecten comandos mediante metacaracteres shell en una petici\u00f3n de configuraci\u00f3n JSON recibida mediante tr\u00e1fico UDP 127.0.0.1. Esto est\u00e1 relacionado con las funciones add_server, build_config y construct_command_line." } ], "id": "CVE-2017-15924", "lastModified": "2024-11-21T03:15:27.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-10-27T16:29:00.223", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://openwall.com/lists/oss-security/2017/10/13/2" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2017/dsa-4009" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/shadowsocks/shadowsocks-libev/commit/c67d275803dc6ea22c558d06b1f7ba9f94cd8de3" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/shadowsocks/shadowsocks-libev/issues/1734" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.x41-dsec.de/lab/advisories/x41-2017-010-shadowsocks-libev/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://openwall.com/lists/oss-security/2017/10/13/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2017/dsa-4009" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/shadowsocks/shadowsocks-libev/commit/c67d275803dc6ea22c558d06b1f7ba9f94cd8de3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/shadowsocks/shadowsocks-libev/issues/1734" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.x41-dsec.de/lab/advisories/x41-2017-010-shadowsocks-libev/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }