Firefox update patches FTP port scanning flaw

Summary:Mozilla has shipped another Firefox update to patch a security flaw in the way the browser implements the FTP protocol.Exploitation of the flaw, which is rated low-risk, could allow an attacker to perform reconnaissance on a vulnerable machine.

Mozilla has shipped another Firefox update to patch a security flaw in the way the browser implements the FTP protocol.

Exploitation of the flaw, which is rated low-risk, could allow an attacker to perform reconnaissance on a vulnerable machine.

According to an advisory from Mozilla, the FTP protocol includes the PASV (passive) command which is used by Firefox to request an alternate data port. The specification allows the server response to include an alternate server address as well, although this is rarely used in practice.

The open-source group warned that a malicious web page hosted on a specially-coded FTP server could use the feature to perform a rudimentary port-scan of machines inside the firewall of the victim.

"By itself this causes no harm, but information about an internal network may be useful to an attacker should there be other vulnerabilities present on the network," Mozilla said.   Patched versions of Firefox will now ignore the alternate server address.

This is the 11th Firefox security advisory released in 2007.

Topics: Browser, Servers

About

Ryan Naraine is a journalist and social media enthusiast specializing in Internet and computer security issues. He is currently security evangelist at Kaspersky Lab, an anti-malware company with operations around the globe. He is taking a leadership role in developing the company's online community initiative around secure content managem... Full Bio

zdnet_core.socialButton.googleLabel Contact Disclosure

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.

Related Stories

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.