In ProFTPD 1.3.7, it is possible to corrupt the memory pool by interrupting the data transfer channel. This triggers a use-after-free in alloc_pool in pool.c, and possible remote code execution.
CPE | Name | Operator | Version |
---|---|---|---|
debian_linux | eq | 8.0 | |
debian_linux | eq | 9.0 | |
debian_linux | eq | 10.0 | |
fedora | eq | 30 | |
fedora | eq | 31 | |
backports_sle | eq | 15.0 sp1 | |
backports_sle | eq | 15.0 | |
leap | eq | 15.1 | |
proftpd | eq | 1.3.7 | |
simatic_net_cp_1543-1_firmware | lt | 3.0 |
lists.opensuse.org/opensuse-security-announce/2020-03/msg00002.html
www.openwall.com/lists/oss-security/2021/08/25/1
www.openwall.com/lists/oss-security/2021/09/06/2
cert-portal.siemens.com/productcert/pdf/ssa-679335.pdf
github.com/proftpd/proftpd/blob/master/RELEASE_NOTES
github.com/proftpd/proftpd/issues/903
lists.debian.org/debian-lts-announce/2020/02/msg00022.html
lists.debian.org/debian-lts-announce/2020/03/msg00002.html
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCUPRYSJR7XOM3HQ6H5M4OGDU7OHCHBF/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XHO3S5WPRRP7VGKIAHLYQVEYW5HRYIJN/
security.gentoo.org/glsa/202003-35
www.debian.org/security/2020/dsa-4635