First published: Thu Feb 20 2020(Updated: )
In ProFTPD 1.3.7, it is possible to corrupt the memory pool by interrupting the data transfer channel. This triggers a use-after-free in alloc_pool in pool.c, and possible remote code execution.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/proftpd-dfsg | 1.3.6-4+deb10u6 1.3.6-4+deb10u4 1.3.7a+dfsg-12+deb11u2 1.3.8+dfsg-4+deb12u1 1.3.8+dfsg-8 | |
debian/proftpd-dfsg | <=1.3.5b-4+deb9u3<=1.3.6-1<=1.3.5b-1<=1.3.6-4+deb10u3 | 1.3.6c-1 1.3.5b-4+deb9u4 1.3.6-4+deb10u4 |
Proftpd Proftpd | =1.3.7 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
openSUSE Backports SLE | =15.0 | |
openSUSE Backports SLE | =15.0-sp1 | |
openSUSE Leap | =15.1 | |
Siemens Simatic Net Cp 1545-1 Firmware | ||
Siemens Simatic Net Cp 1545-1 | ||
Siemens Simatic Net Cp 1543-1 Firmware | <3.0 | |
Siemens Simatic Net Cp 1543-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-9273.
CVE-2020-9273 has a severity rating of critical (8.8).
ProFTPD versions 1.3.7 and prior are affected.
CVE-2020-9273 can be exploited by interrupting the data transfer channel in ProFTPD 1.3.7, which triggers a use-after-free vulnerability and may lead to remote code execution.
Yes, the fix for CVE-2020-9273 is included in ProFTPD versions 1.3.7a, 1.3.8, and later.