First published: Tue Nov 26 2019(Updated: )
An issue was discovered in tls_verify_crl in ProFTPD through 1.3.6b. A dereference of a NULL pointer may occur. This pointer is returned by the OpenSSL sk_X509_REVOKED_value() function when encountering an empty CRL installed by a system administrator. The dereference occurs when validating the certificate of a client connecting to the server in a TLS client/server mutual-authentication setup.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Proftpd Proftpd | <=1.3.5e | |
Proftpd Proftpd | =1.3.6 | |
Proftpd Proftpd | =1.3.6-alpha | |
Proftpd Proftpd | =1.3.6-beta | |
Proftpd Proftpd | =1.3.6-rc1 | |
Proftpd Proftpd | =1.3.6-rc2 | |
Proftpd Proftpd | =1.3.6-rc3 | |
Proftpd Proftpd | =1.3.6-rc4 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-19269 is a vulnerability discovered in tls_verify_crl in ProFTPD through 1.3.6b.
CVE-2019-19269 has a severity rating of 4.9, which is considered medium.
CVE-2019-19269 affects ProFTPD versions 1.3.5e, 1.3.6, 1.3.6-alpha, 1.3.6-beta, 1.3.6-rc1, 1.3.6-rc2, 1.3.6-rc3.
To fix CVE-2019-19269, you should update ProFTPD to a version that is not affected by the vulnerability.
You can find more information about CVE-2019-19269 in the references provided: http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00009.html, https://github.com/proftpd/proftpd/issues/861, https://lists.debian.org/debian-lts-announce/2019/11/msg00039.html