Debian Security Advisory
DLA-2115-2 proftpd-dfsg regression update -- LTS security update
- Date Reported:
- 02 Mar 2020
- Affected Packages:
- proftpd-dfsg
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2020-9273.
- More information:
-
It was discovered that there was a regression in a previous fix for a use-after-free vulnerability in the proftpd-dfsg FTP server.
Exploitation of the original vulnerability within the memory pool handling could have allowed a remote attacker to execute arbitrary code on the affected system. However, the fix that was released in proftpd-dfsg version 1.3.5e+r1.3.5-2+deb8u6 had a regression around the handling of log formatting.
- CVE-2020-9273
In ProFTPD 1.3.7, it is possible to corrupt the memory pool by interrupting the data transfer channel. This triggers a use-after-free in alloc_pool in pool.c, and possible remote code execution.
For Debian 8
Jessie
, these problems have been fixed in version 1.3.5e+r1.3.5-2+deb8u7.We recommend that you upgrade your proftpd-dfsg packages.
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
- CVE-2020-9273