ProFTPD 1.3.7 has an out-of-bounds (OOB) read vulnerability in mod_cap via the cap_text.c cap_to_text function.
References
Link | Resource |
---|---|
https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES | Release Notes Third Party Advisory |
https://github.com/proftpd/proftpd/issues/902 | Issue Tracking Patch Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00002.html | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202003-35 | Third Party Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-679335.pdf | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
|
Information
Published : 2020-02-20 08:15
Updated : 2021-11-09 09:48
NVD link : CVE-2020-9272
Mitre link : CVE-2020-9272
JSON object : View
CWE
CWE-125
Out-of-bounds Read
Products Affected
siemens
- simatic_net_cp_1545-1_firmware
- simatic_net_cp_1545-1
- simatic_net_cp_1543-1
- simatic_net_cp_1543-1_firmware
opensuse
- backports_sle
- leap
proftpd
- proftpd