CVE Vulnerabilities

CVE-2019-19269

NULL Pointer Dereference

Published: Nov 30, 2019 | Modified: Nov 21, 2024
CVSS 3.x
4.9
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
4 MEDIUM
AV:N/AC:L/Au:S/C:N/I:N/A:P
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

An issue was discovered in tls_verify_crl in ProFTPD through 1.3.6b. A dereference of a NULL pointer may occur. This pointer is returned by the OpenSSL sk_X509_REVOKED_value() function when encountering an empty CRL installed by a system administrator. The dereference occurs when validating the certificate of a client connecting to the server in a TLS client/server mutual-authentication setup.

Weakness

The product dereferences a pointer that it expects to be valid but is NULL.

Affected Software

NameVendorStart VersionEnd Version
ProftpdProftpd*1.3.5e (including)
ProftpdProftpd1.3.6 (including)1.3.6 (including)
ProftpdProftpd1.3.6-alpha (including)1.3.6-alpha (including)
ProftpdProftpd1.3.6-beta (including)1.3.6-beta (including)
ProftpdProftpd1.3.6-rc1 (including)1.3.6-rc1 (including)
ProftpdProftpd1.3.6-rc2 (including)1.3.6-rc2 (including)
ProftpdProftpd1.3.6-rc3 (including)1.3.6-rc3 (including)
ProftpdProftpd1.3.6-rc4 (including)1.3.6-rc4 (including)
Proftpd-dfsgUbuntubionic*
Proftpd-dfsgUbuntudisco*
Proftpd-dfsgUbuntueoan*
Proftpd-dfsgUbuntufocal*
Proftpd-dfsgUbuntugroovy*
Proftpd-dfsgUbuntuhirsute*
Proftpd-dfsgUbuntuimpish*
Proftpd-dfsgUbuntukinetic*
Proftpd-dfsgUbuntulunar*
Proftpd-dfsgUbuntumantic*
Proftpd-dfsgUbuntuoracular*
Proftpd-dfsgUbuntuplucky*
Proftpd-dfsgUbuntutrusty*
Proftpd-dfsgUbuntuxenial*

Potential Mitigations

References