6.8
CVSSv2

CVE-2007-1562

Published: 21/03/2007 Updated: 09/12/2020
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 685
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

The FTP protocol implementation in Mozilla Firefox prior to 1.5.0.11 and 2.x prior to 2.0.0.3 allows remote malicious users to force the client to connect to other servers, perform a proxied port scan, or obtain sensitive information by specifying an alternate server address in an FTP PASV response.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox

canonical ubuntu linux 6.06

canonical ubuntu linux 5.10

canonical ubuntu linux 6.10

Vendor Advisories

A flaw was discovered in how Firefox handled PASV FTP responses If a user were tricked into visiting a malicious FTP server, a remote attacker could perform a port-scan of machines within the user’s network, leading to private information disclosure ...

Exploits

source: wwwsecurityfocuscom/bid/23082/info Mozilla Firefox is prone to vulnerability that may allow attackers to obtain potentially sensitive information A successful exploit of this issue would cause the affected application to connect to arbitrary TCP ports and potentially reveal sensitive information about services that are running o ...