CVE-2020-9272

NameCVE-2020-9272
DescriptionProFTPD 1.3.7 has an out-of-bounds (OOB) read vulnerability in mod_cap via the cap_text.c cap_to_text function.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
proftpd-dfsg (PTS)jessie1.3.5-1.1+deb8u2vulnerable
jessie (security)1.3.5e+r1.3.5-2+deb8u7vulnerable
stretch1.3.5b-4+deb9u3vulnerable
stretch (security)1.3.5b-4+deb9u4vulnerable
buster1.3.6-4+deb10u3vulnerable
buster (security)1.3.6-4+deb10u4vulnerable
bullseye, sid1.3.6c-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
proftpd-dfsgsource(unstable)1.3.6c-1unimportant

Notes

https://github.com/proftpd/proftpd/issues/902
Debian does not build mod_cap and does not use the embedded libcap.
Sourcewise fixed in 1.3.6c by updating to the lastest libcap.

Search for package or bug name: Reporting problems