The FTP protocol implementation in Opera 9.10 allows remote attackers to allows remote servers to force the client to connect to other servers, perform a proxied port scan, or obtain sensitive information by specifying an alternate server address in an FTP PASV response.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://bindshell.net/papers/ftppasv/ftp-client-pasv-manipulation.pdf | |
http://www.vupen.com/english/advisories/2007/1075 | vdb entry vendor advisory |
http://secunia.com/advisories/25027 | third party advisory vendor advisory |
http://www.novell.com/linux/security/advisories/2007_28_opera.html | vendor advisory |
http://www.securityfocus.com/bid/23089 | vdb entry |
http://www.securitytracker.com/id?1017802 | vdb entry |