CVE-2007-1562
Summary
| CVE | CVE-2007-1562 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2007-03-21 19:19:00 UTC |
| Updated | 2020-12-09 10:15:00 UTC |
| Description | The FTP protocol implementation in Mozilla Firefox before 1.5.0.11 and 2.x before 2.0.0.3 allows remote attackers to force the client to connect to other servers, perform a proxied port scan, or obtain sensitive information by specifying an alternate server address in an FTP PASV response. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Bug 370559 – security problem handling responses to FTP PASV command |
MISC |
bugzilla.mozilla.org |
Issue Tracking, Vendor Advisory |
| IBM X-Force Exchange |
XF |
exchange.xforce.ibmcloud.com |
Third Party Advisory, VDB Entry |
| issues.rpath.com/browse/RPL-1157 |
CONFIRM |
issues.rpath.com |
Broken Link |
| SecurityFocus |
BUGTRAQ |
www.securityfocus.com |
Third Party Advisory, VDB Entry |
| MFSA 2007-11: FTP PASV port-scanning |
CONFIRM |
www.mozilla.org |
Vendor Advisory |
| SUSE updates for Mozilla Products - Advisories - Secunia |
SECUNIA |
secunia.com |
Third Party Advisory |
| oss-security - [SECURITY ADVISORY] curl: trusting FTP PASV responses |
MLIST |
www.openwall.com |
|
| rhn.redhat.com | Red Hat Support |
REDHAT |
www.redhat.com |
Third Party Advisory |
| Support |
REDHAT |
www.redhat.com |
Third Party Advisory |
| USN-443-1: Firefox vulnerability | Ubuntu |
UBUNTU |
www.ubuntu.com |
Third Party Advisory |
| Red Hat update for firefox - Advisories - Secunia |
SECUNIA |
secunia.com |
Third Party Advisory |
| Mozilla FireFox FTP PASV Port-Scanning Vulnerability |
BID |
www.securityfocus.com |
Third Party Advisory, VDB Entry |
| SecurityFocus |
BUGTRAQ |
www.securityfocus.com |
Third Party Advisory, VDB Entry |
| HPSBUX02153 SSRT061181 rev.7 - HP-UX Running Firefox, Remote Unauthorized Access or Elevation of Privileges or Denial of Service (DoS) - c00771742 -
HP Business Support Center |
HP |
h20000.www2.hp.com |
Broken Link |
| rPath update for firefox and thunderbird - Advisories - Secunia |
SECUNIA |
secunia.com |
Third Party Advisory |
| Security Announcement |
SUSE |
www.novell.com |
Broken Link |
| Page not found - CVE.report |
MISC |
bindshell.net |
Broken Link |
| Repository / Oval Repository |
OVAL |
oval.cisecurity.org |
Third Party Advisory |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH |
VUPEN |
www.vupen.com |
Third Party Advisory |
| Mozilla Firefox FTP PASV Implementation Permits Port Scanning - SecurityTracker |
SECTRACK |
www.securitytracker.com |
Third Party Advisory, VDB Entry |
| issues.rpath.com/browse/RPL-1424 |
CONFIRM |
issues.rpath.com |
Broken Link |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 296067 Oracle Solaris 11.4 Support Repository Update (SRU) 33.94.0 Missing (CPUAPR2021)