CVE-2020-9273

NameCVE-2020-9273
DescriptionIn ProFTPD 1.3.7, it is possible to corrupt the memory pool by interrupting the data transfer channel. This triggers a use-after-free in alloc_pool in pool.c, and possible remote code execution.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-2115-1, DLA-2115-2, DSA-4635-1
NVD severityhigh
Debian Bugs951800

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
proftpd-dfsg (PTS)jessie1.3.5-1.1+deb8u2vulnerable
jessie (security)1.3.5e+r1.3.5-2+deb8u7fixed
stretch1.3.5b-4+deb9u3vulnerable
stretch (security)1.3.5b-4+deb9u4fixed
buster1.3.6-4+deb10u3vulnerable
buster (security)1.3.6-4+deb10u4fixed
bullseye, sid1.3.6c-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
proftpd-dfsgsource(unstable)1.3.6c-2951800
proftpd-dfsgsourcebuster1.3.6-4+deb10u4DSA-4635-1
proftpd-dfsgsourcejessie1.3.5e+r1.3.5-2+deb8u7DLA-2115-2
proftpd-dfsgsourcestretch1.3.5b-4+deb9u4DSA-4635-1

Notes

https://github.com/proftpd/proftpd/issues/903
https://github.com/proftpd/proftpd/commit/d388f7904d4c9a6d0ea54237b8b54a57c19d8d49 (master)
https://github.com/proftpd/proftpd/commit/f8047a1ed0e0eb15193f555c4cbbb281e705c5c3 (master)
https://github.com/proftpd/proftpd/commit/e845abc1bd86eebec7a0342fded908a1b0f1996b (1.3.6c)
https://github.com/proftpd/proftpd/commit/cd9036f4ef7a05c107f0ffcb19a018b20267c531 (1.3.6-branch)

Search for package or bug name: Reporting problems