DescriptionThe FTP protocol implementation in Mozilla Firefox before 184.108.40.206 and 2.x before 220.127.116.11 allows remote attackers to force the client to connect to other servers, perform a proxied port scan, or obtain sensitive information by specifying an alternate server address in an FTP PASV response.
Upstream Security Advisories:
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
|National Vulnerability Database|
SUSE Security Advisories:
- SUSE-SA:2007:036, published Wed, 27 Jun 2007 15:00:00 +0000
SUSE Timeline for this CVECVE page created: Fri Jun 28 02:47:59 2013
CVE page last modified: Fri Oct 7 12:45:36 2022