CVE编号
CVE-2007-1562利用情况
暂无补丁情况
官方补丁披露时间
2007-03-22漏洞描述
Mozilla Firefox中1.5.0.11之前的FTP协议实现和2.0.0.3之前的2.x允许远程攻击者强制客户端连接到其他服务器,执行代理端口扫描,或者通过在FTP PASV响应中指定备用服务器地址来获取敏感信息。解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
http://bindshell.net/papers/ftppasv/ftp-client-pasv-manipulation.pdf | |
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742 | |
http://secunia.com/advisories/25476 | |
http://secunia.com/advisories/25490 | |
http://secunia.com/advisories/25858 | |
http://www.mozilla.org/security/announce/2007/mfsa2007-11.html | |
http://www.novell.com/linux/security/advisories/2007_36_mozilla.html | |
http://www.openwall.com/lists/oss-security/2020/12/09/1 | |
http://www.redhat.com/support/errata/RHSA-2007-0400.html | |
http://www.redhat.com/support/errata/RHSA-2007-0402.html | |
http://www.securityfocus.com/archive/1/463501/100/0/threaded | |
http://www.securityfocus.com/archive/1/470172/100/200/threaded | |
http://www.securityfocus.com/bid/23082 | |
http://www.securitytracker.com/id?1017800 | |
http://www.ubuntu.com/usn/usn-443-1 | |
http://www.vupen.com/english/advisories/2007/1034 | |
https://bugzilla.mozilla.org/show_bug.cgi?id=370559 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/33119 | |
https://issues.rpath.com/browse/RPL-1157 | |
https://issues.rpath.com/browse/RPL-1424 | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova... |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | mozilla | firefox | * |
From (including) 1.5 |
Up to (excluding) 1.5.0.11 |
||||
运行在以下环境 | |||||||||
应用 | mozilla | firefox | * |
From (including) 2.0 |
Up to (excluding) 2.0.0.3 |
||||
运行在以下环境 | |||||||||
系统 | centos_5 | devhelp | * |
Up to (excluding) 0.12-11.el5 |
|||||
运行在以下环境 | |||||||||
系统 | centos_5 | devhelp-devel | * |
Up to (excluding) 0.12-11.el5 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_5 | devhelp | * |
Up to (excluding) 2.16.0-15.el5 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_5 | devhelp-devel | * |
Up to (excluding) 2.16.0-15.el5 |
|||||
- 攻击路径 本地
- 攻击复杂度 困难
- 权限要求 普通权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 -
还没有评论,来说两句吧...