An arbitrary file copy vulnerability in mod_copy in ProFTPD up to 1.3.5b allows for remote code execution and information disclosure without authentication, a related issue to CVE-2015-3306.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
AND |
|
History
21 Nov 2024, 04:23
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.proftpd.org/show_bug.cgi?id=4372 - Exploit, Issue Tracking, Patch, Vendor Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00004.html - Broken Link | |
References | () http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00022.html - Broken Link | |
References | () http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00009.html - Broken Link | |
References | () http://www.securityfocus.com/bid/109339 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-940889.pdf - Third Party Advisory | |
References | () https://github.com/proftpd/proftpd/pull/816 - Patch, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2019/08/msg00006.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OJDQ3XUYWO42TJBO53NUWDZRA35QMVEI/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XM5FPBAGSIKV6YJZEPM6GPGJO5JFT7XU/ - | |
References | () https://seclists.org/bugtraq/2019/Aug/3 - Mailing List, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201908-16 - Third Party Advisory | |
References | () https://tbspace.de/cve201912815proftpd.html - Patch, Third Party Advisory | |
References | () https://www.debian.org/security/2019/dsa-4491 - Third Party Advisory |
01 Mar 2023, 16:39
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:* cpe:2.3:o:siemens:simatic_cp_1543-1_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* cpe:2.3:h:siemens:simatic_cp_1543-1:-:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
|
References | (MLIST) https://lists.debian.org/debian-lts-announce/2019/08/msg00006.html - Mailing List, Third Party Advisory | |
References | (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-940889.pdf - Third Party Advisory | |
References | (GENTOO) https://security.gentoo.org/glsa/201908-16 - Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XM5FPBAGSIKV6YJZEPM6GPGJO5JFT7XU/ - Mailing List, Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00022.html - Broken Link | |
References | (BUGTRAQ) https://seclists.org/bugtraq/2019/Aug/3 - Mailing List, Third Party Advisory | |
References | (DEBIAN) https://www.debian.org/security/2019/dsa-4491 - Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00009.html - Broken Link | |
References | (BID) http://www.securityfocus.com/bid/109339 - Broken Link, Third Party Advisory, VDB Entry | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00004.html - Broken Link | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OJDQ3XUYWO42TJBO53NUWDZRA35QMVEI/ - Mailing List, Third Party Advisory |
Information
Published : 2019-07-19 23:15
Updated : 2024-11-21 04:23
NVD link : CVE-2019-12815
Mitre link : CVE-2019-12815
CVE.ORG link : CVE-2019-12815
JSON object : View
Products Affected
fedoraproject
- fedora
debian
- debian_linux
siemens
- simatic_cp_1543-1
- simatic_cp_1543-1_firmware
proftpd
- proftpd
CWE
CWE-755
Improper Handling of Exceptional Conditions