// For flags

CVE-2019-19269

 

Severity Score

4.9
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An issue was discovered in tls_verify_crl in ProFTPD through 1.3.6b. A dereference of a NULL pointer may occur. This pointer is returned by the OpenSSL sk_X509_REVOKED_value() function when encountering an empty CRL installed by a system administrator. The dereference occurs when validating the certificate of a client connecting to the server in a TLS client/server mutual-authentication setup.

Se detectó un problema en tls_verify_crl en ProFTPD versiones hasta 1.3.6b. Se puede presentar una desreferencia de un puntero NULL. Este puntero es devuelto por la función sk_X509_REVOKED_value() de OpenSSL cuando encuentra una CRL vacía instalada mediante un administrador del sistema. La desreferencia se presenta cuando se comprueba el certificado de un cliente que conecta al servidor en una configuración de autenticación mutua cliente/servidor TLS.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-11-26 CVE Reserved
  • 2019-11-26 CVE Published
  • 2024-08-05 CVE Updated
  • 2024-11-19 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-476: NULL Pointer Dereference
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Proftpd
Search vendor "Proftpd"
Proftpd
Search vendor "Proftpd" for product "Proftpd"
<= 1.3.5e
Search vendor "Proftpd" for product "Proftpd" and version " <= 1.3.5e"
-
Affected
Proftpd
Search vendor "Proftpd"
Proftpd
Search vendor "Proftpd" for product "Proftpd"
1.3.6
Search vendor "Proftpd" for product "Proftpd" and version "1.3.6"
-
Affected
Proftpd
Search vendor "Proftpd"
Proftpd
Search vendor "Proftpd" for product "Proftpd"
1.3.6
Search vendor "Proftpd" for product "Proftpd" and version "1.3.6"
alpha
Affected
Proftpd
Search vendor "Proftpd"
Proftpd
Search vendor "Proftpd" for product "Proftpd"
1.3.6
Search vendor "Proftpd" for product "Proftpd" and version "1.3.6"
beta
Affected
Proftpd
Search vendor "Proftpd"
Proftpd
Search vendor "Proftpd" for product "Proftpd"
1.3.6
Search vendor "Proftpd" for product "Proftpd" and version "1.3.6"
rc1
Affected
Proftpd
Search vendor "Proftpd"
Proftpd
Search vendor "Proftpd" for product "Proftpd"
1.3.6
Search vendor "Proftpd" for product "Proftpd" and version "1.3.6"
rc2
Affected
Proftpd
Search vendor "Proftpd"
Proftpd
Search vendor "Proftpd" for product "Proftpd"
1.3.6
Search vendor "Proftpd" for product "Proftpd" and version "1.3.6"
rc3
Affected
Proftpd
Search vendor "Proftpd"
Proftpd
Search vendor "Proftpd" for product "Proftpd"
1.3.6
Search vendor "Proftpd" for product "Proftpd" and version "1.3.6"
rc4
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
30
Search vendor "Fedoraproject" for product "Fedora" and version "30"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
31
Search vendor "Fedoraproject" for product "Fedora" and version "31"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
8.0
Search vendor "Debian" for product "Debian Linux" and version "8.0"
-
Affected