Vulnerability Details : CVE-2019-19269
An issue was discovered in tls_verify_crl in ProFTPD through 1.3.6b. A dereference of a NULL pointer may occur. This pointer is returned by the OpenSSL sk_X509_REVOKED_value() function when encountering an empty CRL installed by a system administrator. The dereference occurs when validating the certificate of a client connecting to the server in a TLS client/server mutual-authentication setup.
Products affected by CVE-2019-19269
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
- cpe:2.3:a:proftpd:proftpd:*:*:*:*:*:*:*:*
- cpe:2.3:a:proftpd:proftpd:1.3.6:rc1:*:*:*:*:*:*
- cpe:2.3:a:proftpd:proftpd:1.3.6:rc2:*:*:*:*:*:*
- cpe:2.3:a:proftpd:proftpd:1.3.6:rc3:*:*:*:*:*:*
- cpe:2.3:a:proftpd:proftpd:1.3.6:rc4:*:*:*:*:*:*
- cpe:2.3:a:proftpd:proftpd:1.3.6:-:*:*:*:*:*:*
- cpe:2.3:a:proftpd:proftpd:1.3.6:alpha:*:*:*:*:*:*
- cpe:2.3:a:proftpd:proftpd:1.3.6:beta:*:*:*:*:*:*
Threat overview for CVE-2019-19269
Top countries where our scanners detected CVE-2019-19269
Top open port discovered on systems with this issue
21
IPs affected by CVE-2019-19269 277,575
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2019-19269!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2019-19269
1.78%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 81 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-19269
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:N/I:N/A:P |
8.0
|
2.9
|
NIST | |
4.9
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
1.2
|
3.6
|
NIST |
CWE ids for CVE-2019-19269
-
The product dereferences a pointer that it expects to be valid but is NULL.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-19269
-
https://github.com/proftpd/proftpd/issues/861
DoS (nullptr dereference) 2/2 with CRLs in mod_tls of ProFTPD master HEAD · Issue #861 · proftpd/proftpd · GitHubPatch;Third Party Advisory
-
https://www.oracle.com/security-alerts/cpuapr2020.html
Oracle Critical Patch Update Advisory - April 2020
-
https://lists.debian.org/debian-lts-announce/2019/11/msg00039.html
[SECURITY] [DLA 2018-1] proftpd-dfsg security updateThird Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGBBCPLJSDPFG5EI5P5G7P4KEX7YSD5G/
[SECURITY] Fedora 30 Update: proftpd-1.3.6b-2.fc30 - package-announce - Fedora Mailing-ListsThird Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QR65XUHPCRU3NXTSFVF2J4GWRIHC7AHW/
[SECURITY] Fedora 31 Update: proftpd-1.3.6b-2.fc31 - package-announce - Fedora Mailing-ListsThird Party Advisory
-
https://security.gentoo.org/glsa/202003-35
ProFTPd: Multiple vulnerabilities (GLSA 202003-35) — Gentoo security
-
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00009.html
[security-announce] openSUSE-SU-2020:0031-1: moderate: Security update f
Jump to