CVE-2020-9273
ProFTPd vulnerability analysis and mitigation

Overview

CVE-2020-9273 is a use-after-free vulnerability discovered in ProFTPD 1.3.7, reported on February 20, 2020. The vulnerability occurs when interrupting the data transfer channel, which can corrupt the memory pool and trigger a use-after-free condition in alloc_pool in pool.c, potentially leading to remote code execution (GitHub Issue, NVD).

Technical details

The vulnerability stems from a memory corruption issue in ProFTPD's memory pool allocator. When a data transfer is interrupted, it can lead to a dangling pointer due to an use-after-free vulnerability in the alloc_pool function. The issue occurs specifically when the function executes the instruction first_avail = blok->h.first_avail with a corrupted pool. The source of the problem originates from a pcalloc call in netio.c:1066, which ultimately results in a corrupted memory reference (GitHub Issue).

Impact

The vulnerability can allow a remote attacker to execute arbitrary code on the affected system with the privileges of the process. Additionally, it can lead to denial of service conditions. The issue affects both authenticated users and potentially anonymous FTP users (Debian Security, GitHub Issue).

Mitigation and workarounds

The vulnerability has been fixed in various distribution releases including Debian 8 'Jessie' (version 1.3.5e+r1.3.5-2+deb8u6), Debian 9 'Stretch' (version 1.3.5b-4+deb9u4), and Debian 10 'Buster' (version 1.3.6-4+deb10u4). Users are recommended to upgrade their proftpd-dfsg packages to the latest version (Debian LTS, Debian Security).

Additional resources


SourceThis report was generated using AI

Related ProFTPd vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2010-20103CRITICAL9.3
  • ProFTPdProFTPd
  • cpe:2.3:a:proftpd:proftpd
NoNoAug 20, 2025
CVE-2024-48651HIGH7.5
  • ProFTPdProFTPd
  • cpe:2.3:a:proftpd:proftpd
NoYesNov 29, 2024
CVE-2023-51713HIGH7.5
  • ProFTPdProFTPd
  • proftpd-devel
NoYesDec 22, 2023
CVE-2021-46854HIGH7.5
  • ProFTPdProFTPd
  • proftpd
NoYesNov 23, 2022
CVE-2023-48795MEDIUM5.9
  • PythonPython
  • openshift4::ose-ptp-rhel9@sha256:7ecd3eb4ba15e62a0c671fc2c6e46974c2e5a5c8e3db5d4cae19a06fcde3a6d2_arm64
NoYesDec 18, 2023

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management