Debian Security Advisory

DLA-2115-2 proftpd-dfsg regression update -- LTS security update

Date Reported:
02 Mar 2020
Affected Packages:
proftpd-dfsg
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2020-9273.
More information:

It was discovered that there was a regression in a previous fix for a use-after-free vulnerability in the proftpd-dfsg FTP server.

Exploitation of the original vulnerability within the memory pool handling could have allowed a remote attacker to execute arbitrary code on the affected system. However, the fix that was released in proftpd-dfsg version 1.3.5e+r1.3.5-2+deb8u6 had a regression around the handling of log formatting.

  • CVE-2020-9273

    In ProFTPD 1.3.7, it is possible to corrupt the memory pool by interrupting the data transfer channel. This triggers a use-after-free in alloc_pool in pool.c, and possible remote code execution.

For Debian 8 Jessie, these problems have been fixed in version 1.3.5e+r1.3.5-2+deb8u7.

We recommend that you upgrade your proftpd-dfsg packages.

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS