Vulnerability Description
The FTP protocol implementation in Opera 9.10 allows remote attackers to allows remote servers to force the client to connect to other servers, perform a proxied port scan, or obtain sensitive information by specifying an alternate server address in an FTP PASV response.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Opera | Opera Browser | 9.10 |
Related Weaknesses (CWE)
References
- http://bindshell.net/papers/ftppasv/ftp-client-pasv-manipulation.pdf
- http://secunia.com/advisories/25027Vendor Advisory
- http://www.novell.com/linux/security/advisories/2007_28_opera.html
- http://www.securityfocus.com/bid/23089
- http://www.securitytracker.com/id?1017802
- http://www.vupen.com/english/advisories/2007/1075Vendor Advisory
- http://bindshell.net/papers/ftppasv/ftp-client-pasv-manipulation.pdf
- http://secunia.com/advisories/25027Vendor Advisory
- http://www.novell.com/linux/security/advisories/2007_28_opera.html
- http://www.securityfocus.com/bid/23089
- http://www.securitytracker.com/id?1017802
- http://www.vupen.com/english/advisories/2007/1075Vendor Advisory
FAQ
What is CVE-2007-1563?
CVE-2007-1563 is a vulnerability with a CVSS score of 6.8 (MEDIUM). The FTP protocol implementation in Opera 9.10 allows remote attackers to allows remote servers to force the client to connect to other servers, perform a proxied port scan, or obtain sensitive informa...
How severe is CVE-2007-1563?
CVE-2007-1563 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-1563?
Check the references section above for vendor advisories and patch information. Affected products include: Opera Opera Browser.