漏洞信息详情

ProFTPD 访问控制错误漏洞

  • CNNVD编号:CNNVD-201907-1142
  • 危害等级: 超危
  • CVE编号: CVE-2019-12815
  • 漏洞类型: 访问控制错误
  • 发布时间: 2019-07-19
  • 威胁类型: 远程
  • 更新时间: 2020-08-25
  • 厂        商:
  • 漏洞来源: Salvatore Bonaccor...

漏洞简介

ProFTPD是ProFTPD团队的一套安全云打印解决方案。该方案支持从笔记本电脑、台式机和移动设备连接打印机进行打印。

ProFTPD 1.3.5b及之前版本中存在安全漏洞。远程攻击者可利用该漏洞未经身份验证便可执行代码并泄露信息。

漏洞公告

目前厂商已发布升级补丁以修复漏洞,补丁获取链接:

http://bugs.proftpd.org/show_bug.cgi?id=4372

参考网址

来源:SUSE

链接:http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00022.html

来源:FEDORA

链接:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XM5FPBAGSIKV6YJZEPM6GPGJO5JFT7XU/

来源:tbspace.de

链接:https://tbspace.de/cve201912815proftpd.html

来源:github.com

链接:https://github.com/proftpd/proftpd/pull/816

来源:bugs.proftpd.org

链接:http://bugs.proftpd.org/show_bug.cgi?id=4372

来源:SUSE

链接:http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00004.html

来源:GENTOO

链接:https://security.gentoo.org/glsa/201908-16

来源:CONFIRM

链接:https://cert-portal.siemens.com/productcert/pdf/ssa-940889.pdf

来源:SUSE

链接:http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00009.html

来源:MLIST

链接:https://lists.debian.org/debian-lts-announce/2019/08/msg00006.html

来源:www.proftpd.org

链接:http://www.proftpd.org

来源:github.com

链接:https://github.com/proftpd/proftpd/commit/71cd49ea82313f78d52a52d0c628a3770dc96608

来源:github.com

链接:https://github.com/proftpd/proftpd/commit/5e28a88ac0eb5e87af5fc752d912286c8d3609d3

来源:BID

链接:https://www.securityfocus.com/bid/109339

来源:BUGTRAQ

链接:https://seclists.org/bugtraq/2019/Aug/3

来源:DEBIAN

链接:https://www.debian.org/security/2019/dsa-4491

来源:FEDORA

链接:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OJDQ3XUYWO42TJBO53NUWDZRA35QMVEI/

来源:www.debian.org

链接:http://www.debian.org/security/2019/dsa-4491

来源:lists.debian.org

链接:https://lists.debian.org/debian-lts-announce/2019/08/msg00006.html

来源:www.us-cert.gov

链接:https://www.us-cert.gov/ics/advisories/icsa-20-042-10

来源:www.us-cert.gov

链接:https://www.us-cert.gov/ics/advisories/icsa-20-042-09

来源:www.us-cert.gov

链接:https://www.us-cert.gov/ics/advisories/icsa-20-042-08

来源:www.us-cert.gov

链接:https://www.us-cert.gov/ics/advisories/icsa-20-042-07

来源:www.us-cert.gov

链接:https://www.us-cert.gov/ics/advisories/icsa-20-042-06

来源:www.us-cert.gov

链接:https://www.us-cert.gov/ics/advisories/icsa-20-042-05

来源:www.us-cert.gov

链接:https://www.us-cert.gov/ics/advisories/icsa-20-042-04

来源:www.us-cert.gov

链接:https://www.us-cert.gov/ics/advisories/icsa-20-042-02

来源:www.us-cert.gov

链接:https://www.us-cert.gov/ics/advisories/icsa-20-042-01

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/154101/Gentoo-Linux-Security-Advisory-201908-16.html

来源:www.us-cert.gov

链接:https://www.us-cert.gov/ics/advisories/icsa-20-042-03

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0486/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0486.2/

来源:www.securityfocus.com

链接:https://www.securityfocus.com/bid/109339

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0486.3/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2019.2909/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2019.3038/

来源:nvd.nist.gov

链接:https://nvd.nist.gov/vuln/detail/CVE-2019-12815

来源:vigilance.fr

链接:https://vigilance.fr/vulnerability/ProFTPD-read-write-access-via-mod-copy-Limit-Bypass-29844

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/153871/Debian-Security-Advisory-4491-1.html

受影响实体

    暂无


漏洞信息快速查询

相关漏洞

更多