Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Web Browser)  >   Opera Vendors:   Opera Software
Opera FTP PASV Implementation Permits Port Scanning
SecurityTracker Alert ID:  1017802
SecurityTracker URL:
CVE Reference:   CVE-2007-1563   (Links to External Site)
Updated:  May 16 2008
Original Entry Date:  Mar 21 2007
Impact:   Host/resource access via network
Exploit Included:  Yes  
Version(s): 9.10; other versions likely
Description:   A vulnerability was reported in Opera. A remote user can cause Opera to conduct portscans.

In response to an FTP PASV command from the target user's Opera client, the remote connected FTP server can return a port number and different IP address, causing the Opera client to connect to the specified IP address and port number.

A remote user can create a specially crafted web page that, when loaded by the target user, will cause the target user's browser to connect to a malicious FTP server and then scan the ports specified by the malicious FTP server, including scanning systems that are on the target user's internal network.

Mark at reported this vulnerability.

The original advisory is available at:

Impact:   A remote user can cause Opera to conduct portscans.
Solution:   No solution was available at the time of this entry.
Vendor URL: (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC