2023-09-18
ALT-BU-2023-5732-1
Branch sisyphus_mipsel update bulletin.
Package proftpd updated to version 1.3.8-alt0.1.ga3489a6c8 for branch sisyphus_mipsel.
Closed vulnerabilities
Published: 2020-12-22
Modified: 2025-10-28
Modified: 2025-10-28
BDU:2020-05776
Уязвимость реализации функции alloc_pool FTP-сервера ProFTPD, позволяющая нарушителю выполнить произвольный код
Severity: HIGH (8.8)
Vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Severity: CRITICAL (9.0)
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C
References:
Published: 2023-09-15
Modified: 2024-04-05
Modified: 2024-04-05
BDU:2023-05663
Уязвимость FTP-сервера ProFTPD , связанная с ошибкой освобождения памяти, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Severity: HIGH (7.5)
Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Severity: HIGH (7.8)
Vector: AV:N/AC:L/Au:N/C:C/I:N/A:N
References:
Published: 2020-02-20
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2020-9273
In ProFTPD 1.3.7, it is possible to corrupt the memory pool by interrupting the data transfer channel. This triggers a use-after-free in alloc_pool in pool.c, and possible remote code execution.
Severity: CRITICAL (9.0)
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C
Severity: HIGH (8.8)
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
References:
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00002.html
- http://www.openwall.com/lists/oss-security/2021/08/25/1
- http://www.openwall.com/lists/oss-security/2021/09/06/2
- https://cert-portal.siemens.com/productcert/pdf/ssa-679335.pdf
- https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES
- https://github.com/proftpd/proftpd/issues/903
- https://lists.debian.org/debian-lts-announce/2020/02/msg00022.html
- https://lists.debian.org/debian-lts-announce/2020/03/msg00002.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCUPRYSJR7XOM3HQ6H5M4OGDU7OHCHBF/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XHO3S5WPRRP7VGKIAHLYQVEYW5HRYIJN/
- https://security.gentoo.org/glsa/202003-35
- https://www.debian.org/security/2020/dsa-4635
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00002.html
- http://www.openwall.com/lists/oss-security/2021/08/25/1
- http://www.openwall.com/lists/oss-security/2021/09/06/2
- https://cert-portal.siemens.com/productcert/pdf/ssa-679335.pdf
- https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES
- https://github.com/proftpd/proftpd/issues/903
- https://lists.debian.org/debian-lts-announce/2020/02/msg00022.html
- https://lists.debian.org/debian-lts-announce/2020/03/msg00002.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCUPRYSJR7XOM3HQ6H5M4OGDU7OHCHBF/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XHO3S5WPRRP7VGKIAHLYQVEYW5HRYIJN/
- https://security.gentoo.org/glsa/202003-35
- https://www.debian.org/security/2020/dsa-4635
Published: 2022-11-23
Modified: 2025-04-28
Modified: 2025-04-28
CVE-2021-46854
mod_radius in ProFTPD before 1.3.7c allows memory disclosure to RADIUS servers because it copies blocks of 16 characters.
Severity: HIGH (7.5)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
References:
- http://www.proftpd.org/docs/RELEASE_NOTES-1.3.7e
- https://bugs.gentoo.org/811495
- https://github.com/proftpd/proftpd/issues/1284
- https://github.com/proftpd/proftpd/pull/1285
- https://security.gentoo.org/glsa/202305-03
- http://www.proftpd.org/docs/RELEASE_NOTES-1.3.7e
- https://bugs.gentoo.org/811495
- https://github.com/proftpd/proftpd/issues/1284
- https://github.com/proftpd/proftpd/pull/1285
- https://security.gentoo.org/glsa/202305-03