CVE-2019-19269

EUVD-2019-8895
An issue was discovered in tls_verify_crl in ProFTPD through 1.3.6b. A dereference of a NULL pointer may occur. This pointer is returned by the OpenSSL sk_X509_REVOKED_value() function when encountering an empty CRL installed by a system administrator. The dereference occurs when validating the certificate of a client connecting to the server in a TLS client/server mutual-authentication setup.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
4.9 MEDIUM
NETWORK
LOW
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 81%
Affected Products (NVD)
VendorProductVersion
proftpdproftpd
𝑥
≤ 1.3.5e
proftpdproftpd
1.3.6
proftpdproftpd
1.3.6:alpha
proftpdproftpd
1.3.6:beta
proftpdproftpd
1.3.6:rc1
proftpdproftpd
1.3.6:rc2
proftpdproftpd
1.3.6:rc3
proftpdproftpd
1.3.6:rc4
debiandebian_linux
8.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
proftpd-dfsg
bookworm
1.3.8+dfsg-4+deb12u3
fixed
bullseye
1.3.7a+dfsg-12+deb11u2
fixed
sid
1.3.8.b+dfsg-3
fixed
trixie
1.3.8.b+dfsg-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
proftpd-dfsg
bionic
needs-triage
disco
ignored
eoan
ignored
focal
needs-triage
groovy
ignored
hirsute
ignored
impish
ignored
jammy
needs-triage
kinetic
ignored
lunar
ignored
mantic
ignored
noble
needs-triage
trusty
dne
xenial
needs-triage