Debian Security Advisory
DLA-2115-1 proftpd-dfsg -- LTS security update
- Date Reported:
- 21 Feb 2020
- Affected Packages:
- Security database references:
- In Mitre's CVE dictionary: CVE-2020-9273.
- More information:
It was discovered that there was a use-after-free vulnerability in in the proftpd-dfsg FTP server.
Exploitation of this vulnerability within the memory pool handling could have allowed a remote attacker to execute arbitrary code on the affected system.
In ProFTPD 1.3.7, it is possible to corrupt the memory pool by interrupting the data transfer channel. This triggers a use-after-free in alloc_pool in pool.c, and possible remote code execution.
For Debian 8
Jessie, these problems have been fixed in version 1.3.5e+r1.3.5-2+deb8u6.
We recommend that you upgrade your proftpd-dfsg packages.
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS