{"id":"CVE-2019-5163","details":"An exploitable denial-of-service vulnerability exists in the UDPRelay functionality of Shadowsocks-libev 3.3.2. When utilizing a Stream Cipher and a local_address, arbitrary UDP packets can cause a FATAL error code path and exit. An attacker can send arbitrary UDP packets to trigger this vulnerability.","modified":"2026-05-18T05:50:44.894021419Z","published":"2019-12-03T22:15:15.370Z","related":["openSUSE-SU-2019:2667-1","openSUSE-SU-2020:0142-1","openSUSE-SU-2024:11379-1"],"database_specific":{"unresolved_ranges":[{"source":"CPE_FIELD","extracted_events":[{"last_affected":"sle-15-sp1"}],"cpes":["cpe:2.3:o:opensuse:backports:sle-15:sp1:*:*:*:*:*:*"],"vendor_product":"opensuse:backports"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"15.1"}],"cpes":["cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"],"vendor_product":"opensuse:leap"}]},"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00023.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00061.html"},{"type":"EVIDENCE","url":"https://talosintelligence.com/vulnerability_reports/TALOS-2019-0956"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/shadowsocks/shadowsocks-libev","events":[{"introduced":"0"},{"last_affected":"346ab1be4717e26d641635d6f3ece14899688c49"}],"database_specific":{"source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"last_affected":"3.3.2"}],"cpe":"cpe:2.3:a:shadowsocks:shadowsocks-libev:3.3.2:*:*:*:*:*:*:*"}}],"versions":["v3.3.2","v3.3.1","v3.3.0","v3.2.5","v3.2.4","v3.2.3","v3.2.2","v3.2.1","v3.2.0","v3.1.3","v3.1.2","v3.1.1","v3.1.0","v3.0.8","v3.0.7","v3.0.6","v3.0.5","v3.0.4","v3.0.3","v3.0.2","v3.0.1","v3.0.0","v2.6.3","v2.6.2","v2.6.1","v2.6.0","v2.5.6","v2.5.5","v2.5.4","v2.5.3","v2.5.2","v2.5.1","v2.5.0","v2.4.8","v2.4.7","v2.4.6","v2.4.5","v2.4.4","v2.4.3","v2.4.2","v2.4.1","v2.4.0","v2.3.3","v2.3.2","v2.3.1","v2.3.0","v2.2.3","v2.2.2","v2.2.0","v2.1.4","v2.1.3","v2.1.2","v1.6.2","v2.1.1","v2.1.0","v2.0.8","v2.0.7","v2.0.6","v2.0.5","v2.0.4","v2.0.3","v2.0.2","v2.0.1","v1.6.4","v1.6.3","v1.6.1","v1.5.3","v1.5.2","v1.5.1","v1.5.0","v1.4.8","v1.4.7","v1.4.6","v1.4.5","v1.4.4","v1.4.3","v1.4.2","v1.4.1","v1.4.0","v1.3.2","v1.3"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-5163.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}