Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2020-9273
In ProFTPD 1.3.7, it is possible to corrupt the memory pool by interrupting the data transfer channel. This triggers a use-after-free in alloc_pool in pool.c, and possible remote code execution.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.521
EPSS Ranking
97.7%
CVSS Severity
CVSS v3 Score
8.8
CVSS v2 Score
9.0
References
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00002.html
http://www.openwall.com/lists/oss-security/2021/08/25/1
http://www.openwall.com/lists/oss-security/2021/09/06/2
https://cert-portal.siemens.com/productcert/pdf/ssa-679335.pdf
https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES
https://github.com/proftpd/proftpd/issues/903
https://lists.debian.org/debian-lts-announce/2020/02/msg00022.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00002.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCUPRYSJR7XOM3HQ6H5M4OGDU7OHCHBF/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XHO3S5WPRRP7VGKIAHLYQVEYW5HRYIJN/
https://security.gentoo.org/glsa/202003-35
https://www.debian.org/security/2020/dsa-4635
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00002.html
http://www.openwall.com/lists/oss-security/2021/08/25/1
http://www.openwall.com/lists/oss-security/2021/09/06/2
https://cert-portal.siemens.com/productcert/pdf/ssa-679335.pdf
https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES
https://github.com/proftpd/proftpd/issues/903
https://lists.debian.org/debian-lts-announce/2020/02/msg00022.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00002.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCUPRYSJR7XOM3HQ6H5M4OGDU7OHCHBF/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XHO3S5WPRRP7VGKIAHLYQVEYW5HRYIJN/
https://security.gentoo.org/glsa/202003-35
https://www.debian.org/security/2020/dsa-4635
Products affected by CVE-2020-9273
Opensuse
»
Backports Sle
»
Version:
15.0
cpe:2.3:a:opensuse:backports_sle:15.0
Proftpd
»
Proftpd
»
Version:
1.3.7
cpe:2.3:a:proftpd:proftpd:1.3.7
Siemens
»
Simatic Net Cp 1543-1
»
Version:
N/A
cpe:2.3:h:siemens:simatic_net_cp_1543-1:-
Siemens
»
Simatic Net Cp 1545-1
»
Version:
N/A
cpe:2.3:h:siemens:simatic_net_cp_1545-1:-
Debian
»
Debian Linux
»
Version:
10.0
cpe:2.3:o:debian:debian_linux:10.0
Debian
»
Debian Linux
»
Version:
8.0
cpe:2.3:o:debian:debian_linux:8.0
Debian
»
Debian Linux
»
Version:
9.0
cpe:2.3:o:debian:debian_linux:9.0
Fedoraproject
»
Fedora
»
Version:
30
cpe:2.3:o:fedoraproject:fedora:30
Fedoraproject
»
Fedora
»
Version:
31
cpe:2.3:o:fedoraproject:fedora:31
Opensuse
»
Leap
»
Version:
15.1
cpe:2.3:o:opensuse:leap:15.1
Siemens
»
Simatic Net Cp 1543-1 Firmware
»
Version:
N/A
cpe:2.3:o:siemens:simatic_net_cp_1543-1_firmware:-
Siemens
»
Simatic Net Cp 1543-1 Firmware
»
Version:
2.2
cpe:2.3:o:siemens:simatic_net_cp_1543-1_firmware:2.2
Siemens
»
Simatic Net Cp 1545-1 Firmware
»
Version:
N/A
cpe:2.3:o:siemens:simatic_net_cp_1545-1_firmware:-
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved