CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
61.4%
An issue was discovered in tls_verify_crl in ProFTPD through 1.3.6b. A dereference of a NULL pointer may occur. This pointer is returned by the OpenSSL sk_X509_REVOKED_value() function when encountering an empty CRL installed by a system administrator. The dereference occurs when validating the certificate of a client connecting to the server in a TLS client/server mutual-authentication setup.
Vendor | Product | Version | CPE |
---|---|---|---|
proftpd | proftpd | * | cpe:2.3:a:proftpd:proftpd:*:*:*:*:*:*:*:* |
proftpd | proftpd | 1.3.6 | cpe:2.3:a:proftpd:proftpd:1.3.6:-:*:*:*:*:*:* |
proftpd | proftpd | 1.3.6 | cpe:2.3:a:proftpd:proftpd:1.3.6:alpha:*:*:*:*:*:* |
proftpd | proftpd | 1.3.6 | cpe:2.3:a:proftpd:proftpd:1.3.6:beta:*:*:*:*:*:* |
proftpd | proftpd | 1.3.6 | cpe:2.3:a:proftpd:proftpd:1.3.6:rc1:*:*:*:*:*:* |
proftpd | proftpd | 1.3.6 | cpe:2.3:a:proftpd:proftpd:1.3.6:rc2:*:*:*:*:*:* |
proftpd | proftpd | 1.3.6 | cpe:2.3:a:proftpd:proftpd:1.3.6:rc3:*:*:*:*:*:* |
proftpd | proftpd | 1.3.6 | cpe:2.3:a:proftpd:proftpd:1.3.6:rc4:*:*:*:*:*:* |
fedoraproject | fedora | 30 | cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:* |
fedoraproject | fedora | 31 | cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:* |
lists.opensuse.org/opensuse-security-announce/2020-01/msg00009.html
github.com/proftpd/proftpd/issues/861
lists.debian.org/debian-lts-announce/2019/11/msg00039.html
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OGBBCPLJSDPFG5EI5P5G7P4KEX7YSD5G/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QR65XUHPCRU3NXTSFVF2J4GWRIHC7AHW/
security.gentoo.org/glsa/202003-35
www.oracle.com/security-alerts/cpuapr2020.html
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
61.4%