CVE-2020-9273

In ProFTPD 1.3.7, it is possible to corrupt the memory pool by interrupting the data transfer channel. This triggers a use-after-free in alloc_pool in pool.c, and possible remote code execution.
Configurations

Configuration 1 (hide)

cpe:2.3:a:proftpd:proftpd:1.3.7:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*
cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:siemens:simatic_net_cp_1545-1_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_net_cp_1545-1:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:siemens:simatic_net_cp_1543-1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_net_cp_1543-1:-:*:*:*:*:*:*:*

History

14 Sep 2021, 12:43

Type Values Removed Values Added
References (MLIST) https://lists.debian.org/debian-lts-announce/2020/03/msg00002.html - (MLIST) https://lists.debian.org/debian-lts-announce/2020/03/msg00002.html - Mailing List, Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2021/09/06/2 - (MLIST) http://www.openwall.com/lists/oss-security/2021/09/06/2 - Mailing List, Third Party Advisory
References (GENTOO) https://security.gentoo.org/glsa/202003-35 - (GENTOO) https://security.gentoo.org/glsa/202003-35 - Third Party Advisory
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XHO3S5WPRRP7VGKIAHLYQVEYW5HRYIJN/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XHO3S5WPRRP7VGKIAHLYQVEYW5HRYIJN/ - Mailing List, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00002.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00002.html - Mailing List, Third Party Advisory
References (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-679335.pdf - (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-679335.pdf - Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2021/08/25/1 - (MLIST) http://www.openwall.com/lists/oss-security/2021/08/25/1 - Mailing List, Third Party Advisory
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VCUPRYSJR7XOM3HQ6H5M4OGDU7OHCHBF/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VCUPRYSJR7XOM3HQ6H5M4OGDU7OHCHBF/ - Mailing List, Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2020/02/msg00022.html - (MLIST) https://lists.debian.org/debian-lts-announce/2020/02/msg00022.html - Mailing List, Third Party Advisory
References (DEBIAN) https://www.debian.org/security/2020/dsa-4635 - (DEBIAN) https://www.debian.org/security/2020/dsa-4635 - Third Party Advisory
CPE cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
cpe:2.3:o:siemens:simatic_net_cp_1545-1_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_net_cp_1545-1:-:*:*:*:*:*:*:*
cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:siemens:simatic_net_cp_1543-1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_net_cp_1543-1:-:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

06 Sep 2021, 21:15

Type Values Removed Values Added
References
  • (MLIST) http://www.openwall.com/lists/oss-security/2021/09/06/2 -

25 Aug 2021, 12:15

Type Values Removed Values Added
References
  • (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-679335.pdf -
  • (MLIST) http://www.openwall.com/lists/oss-security/2021/08/25/1 -

Information

Published : 2020-02-20 16:15

Updated : 2024-02-04 20:39


NVD link : CVE-2020-9273

Mitre link : CVE-2020-9273

CVE.ORG link : CVE-2020-9273


JSON object : View

Products Affected

debian

  • debian_linux

opensuse

  • backports_sle
  • leap

siemens

  • simatic_net_cp_1543-1_firmware
  • simatic_net_cp_1545-1
  • simatic_net_cp_1545-1_firmware
  • simatic_net_cp_1543-1

proftpd

  • proftpd

fedoraproject

  • fedora
CWE
CWE-416

Use After Free