CWE
416
Advisory Published
Updated

CVE-2020-9273: Use After Free

First published: Thu Feb 20 2020(Updated: )

In ProFTPD 1.3.7, it is possible to corrupt the memory pool by interrupting the data transfer channel. This triggers a use-after-free in alloc_pool in pool.c, and possible remote code execution.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
debian/proftpd-dfsg
1.3.6-4+deb10u6
1.3.6-4+deb10u4
1.3.7a+dfsg-12+deb11u2
1.3.8+dfsg-4+deb12u1
1.3.8+dfsg-8
debian/proftpd-dfsg<=1.3.5b-4+deb9u3<=1.3.6-1<=1.3.5b-1<=1.3.6-4+deb10u3
1.3.6c-1
1.3.5b-4+deb9u4
1.3.6-4+deb10u4
Proftpd Proftpd=1.3.7
Debian Debian Linux=8.0
Debian Debian Linux=9.0
Debian Debian Linux=10.0
Fedoraproject Fedora=30
Fedoraproject Fedora=31
openSUSE Backports SLE=15.0
openSUSE Backports SLE=15.0-sp1
openSUSE Leap=15.1
Siemens Simatic Net Cp 1545-1 Firmware
Siemens Simatic Net Cp 1545-1
Siemens Simatic Net Cp 1543-1 Firmware<3.0
Siemens Simatic Net Cp 1543-1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the vulnerability ID for this ProFTPD vulnerability?

    The vulnerability ID is CVE-2020-9273.

  • What is the severity of CVE-2020-9273?

    CVE-2020-9273 has a severity rating of critical (8.8).

  • What software versions are affected by CVE-2020-9273?

    ProFTPD versions 1.3.7 and prior are affected.

  • How can CVE-2020-9273 be exploited?

    CVE-2020-9273 can be exploited by interrupting the data transfer channel in ProFTPD 1.3.7, which triggers a use-after-free vulnerability and may lead to remote code execution.

  • Is there a fix available for CVE-2020-9273?

    Yes, the fix for CVE-2020-9273 is included in ProFTPD versions 1.3.7a, 1.3.8, and later.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203