{"id":"CVE-2020-9273","details":"In ProFTPD 1.3.7, it is possible to corrupt the memory pool by interrupting the data transfer channel. This triggers a use-after-free in alloc_pool in pool.c, and possible remote code execution.","modified":"2026-03-20T11:37:56.215975Z","published":"2020-02-20T16:15:11.950Z","related":["MGASA-2020-0120","openSUSE-SU-2020:0273-1","openSUSE-SU-2024:11196-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCUPRYSJR7XOM3HQ6H5M4OGDU7OHCHBF/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XHO3S5WPRRP7VGKIAHLYQVEYW5HRYIJN/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00002.html"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2021/09/06/2"},{"type":"ADVISORY","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-679335.pdf"},{"type":"ADVISORY","url":"https://github.com/proftpd/proftpd/issues/903"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/02/msg00022.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/03/msg00002.html"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2021/08/25/1"},{"type":"ADVISORY","url":"https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202003-35"},{"type":"ADVISORY","url":"https://www.debian.org/security/2020/dsa-4635"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/proftpd/proftpd","events":[{"introduced":"0"},{"last_affected":"ceb2f7771e8dd7f0697b5c151f97dd39aa5c453a"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.3.7"}]}}],"versions":["v1.3.6","v1.3.6rc1","v1.3.6rc2","v1.3.6rc3","v1.3.6rc4","v1.3.7","v1.3.7a","v1.3.7b","v1.3.7c","v1.3.7d","v1.3.7e","v1.3.7f","v1.3.7rc1","v1.3.7rc2","v1.3.7rc3","v1.3.7rc4"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"30"}]},{"events":[{"introduced":"0"},{"last_affected":"31"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0-NA"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0-sp1"}]},{"events":[{"introduced":"0"},{"last_affected":"15.1"}]},{"events":[{"introduced":"0"},{"fixed":"3.0"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-9273.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}