vulnerability
ProFTP ProFTPd: CVE-2019-19269: NULL Pointer Dereference
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:L/Au:S/C:N/I:N/A:P) | Nov 26, 2019 | Nov 6, 2025 | Nov 6, 2025 |
Severity
4
CVSS
(AV:N/AC:L/Au:S/C:N/I:N/A:P)
Published
Nov 26, 2019
Added
Nov 6, 2025
Modified
Nov 6, 2025
Description
An issue was discovered in tls_verify_crl in ProFTPD through 1.3.6b. A dereference of a NULL pointer may occur. This pointer is returned by the OpenSSL sk_X509_REVOKED_value() function when encountering an empty CRL installed by a system administrator. The dereference occurs when validating the certificate of a client connecting to the server in a TLS client/server mutual-authentication setup.
Solution
proftp-proftpd-upgrade-latest
References
- CVE-2019-19269
- https://attackerkb.com/topics/CVE-2019-19269
- URL-http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00009.html
- URL-https://github.com/proftpd/proftpd/issues/861
- URL-https://lists.debian.org/debian-lts-announce/2019/11/msg00039.html
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OGBBCPLJSDPFG5EI5P5G7P4KEX7YSD5G/
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QR65XUHPCRU3NXTSFVF2J4GWRIHC7AHW/
- URL-https://security.gentoo.org/glsa/202003-35
- URL-https://www.oracle.com/security-alerts/cpuapr2020.html
- CWE-476
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.