Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Web Browser)  >   Mozilla Firefox Vendors:
Mozilla Firefox FTP PASV Implementation Permits Port Scanning
SecurityTracker Alert ID:  1017800
SecurityTracker URL:
CVE Reference:   CVE-2007-1562   (Links to External Site)
Updated:  May 16 2008
Original Entry Date:  Mar 21 2007
Impact:   Host/resource access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): prior to; also,,
Description:   A vulnerability was reported in Mozilla Firefox. A remote user can cause Firefox to conduct portscans.

In response to an FTP PASV command from the target user's Firefox client, the remote connected FTP server can return a port number and different IP address, causing the Firefox client to connect to the specified IP address and port number.

A remote user can create a specially crafted web page that, when loaded by the target user, will cause the target user's browser to connect to a malicious FTP server and then scan the ports specified by the malicious FTP server, including scanning systems that are on the target user's internal network and scanning ports on the Firefox banned port list.

SeaMonkey is also affected.

Mark at reported this vulnerability.

The original advisory is available at:

Impact:   A remote user can cause Firefox to conduct portscans.
Solution:   The vendor has issued fixed versions (,

The Mozilla advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC