Search for vulnerabilities
Vulnerability details: VCID-hhjt-wqw4-aaak
Vulnerability ID VCID-hhjt-wqw4-aaak
Aliases CVE-2020-9273
Summary In ProFTPD 1.3.7, it is possible to corrupt the memory pool by interrupting the data transfer channel. This triggers a use-after-free in alloc_pool in pool.c, and possible remote code execution.
Status Published
Exploitability 0.5
Weighted Severity 8.1
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-9273.html
epss 0.07013 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.07013 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.07013 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.07013 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.07013 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.07013 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.07013 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.07013 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.07013 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.07013 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.07013 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.39137 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.39137 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.39137 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.39137 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.45424 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.45424 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.50923 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.50923 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.50923 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.50923 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.50923 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.50923 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.50923 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.50923 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.50923 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.50923 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.50923 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.50923 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.50923 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.52125 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.52125 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.52125 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.52125 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.52125 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.52125 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.52125 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.52125 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.52125 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.52125 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.52125 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.52125 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.52125 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.52125 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.52125 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.52164 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.52164 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.52164 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.52164 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.52164 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.52164 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.52164 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.52164 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.52164 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.52164 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.52164 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.52164 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
epss 0.56347 https://api.first.org/data/v1/epss?cve=CVE-2020-9273
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9273
cvssv3.1 5.9 https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES
generic_textual MODERATE https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES
generic_textual Medium https://github.com/proftpd/proftpd/issues/903
cvssv2 9.0 https://nvd.nist.gov/vuln/detail/CVE-2020-9273
cvssv3 8.8 https://nvd.nist.gov/vuln/detail/CVE-2020-9273
cvssv3.1 8.8 https://nvd.nist.gov/vuln/detail/CVE-2020-9273
Reference id Reference type URL
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00002.html
http://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-9273.html
https://api.first.org/data/v1/epss?cve=CVE-2020-9273
https://cert-portal.siemens.com/productcert/pdf/ssa-679335.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9273
https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES
https://github.com/proftpd/proftpd/issues/903
https://lists.debian.org/debian-lts-announce/2020/02/msg00022.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00002.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCUPRYSJR7XOM3HQ6H5M4OGDU7OHCHBF/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XHO3S5WPRRP7VGKIAHLYQVEYW5HRYIJN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VCUPRYSJR7XOM3HQ6H5M4OGDU7OHCHBF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XHO3S5WPRRP7VGKIAHLYQVEYW5HRYIJN/
https://security.gentoo.org/glsa/202003-35
https://www.debian.org/security/2020/dsa-4635
http://www.openwall.com/lists/oss-security/2021/08/25/1
http://www.openwall.com/lists/oss-security/2021/09/06/2
951800 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=951800
cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*
cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd:proftpd:1.3.7:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
CVE-2020-9273 https://nvd.nist.gov/vuln/detail/CVE-2020-9273
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2020-9273
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2020-9273
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2020-9273
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.94143
EPSS Score 0.07013
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.