UBUNTU-CVE-2019-5164

Source
https://ubuntu.com/security/CVE-2019-5164
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-5164.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2019-5164
Upstream
Published
2019-12-03T22:15:00Z
Modified
2025-07-18T16:44:58Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

An exploitable code execution vulnerability exists in the ss-manager binary of Shadowsocks-libev 3.3.2. Specially crafted network packets sent to ss-manager can cause an arbitrary binary to run, resulting in code execution and privilege escalation. An attacker can send network packets to trigger this vulnerability.

References

Affected packages

Ubuntu:Pro:18.04:LTS / shadowsocks-libev

Package

Name
shadowsocks-libev
Purl
pkg:deb/ubuntu/shadowsocks-libev@3.1.3+ds-1ubuntu2?arch=source&distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.0.8+ds-2
3.1.0+ds-3
3.1.0+ds-4
3.1.0+ds-5
3.1.1+ds-1
3.1.1+ds-2
3.1.1+ds-3
3.1.3+ds-1ubuntu1
3.1.3+ds-1ubuntu2