Directory traversal vulnerability in the GeoIP_update_database_general function in libGeoIP/GeoIPUpdate.c in GeoIP 1.4.0 allows remote malicious update servers (possibly only update.maxmind.com) to overwrite arbitrary files via a .. (dot dot) in the database filename, which is returned by a request to app/update_getfilename.
References
Configurations
History
21 Nov 2024, 00:25
Type | Values Removed | Values Added |
---|---|---|
References | () http://arctic.org/~dean/patches/GeoIP-1.4.0-update-vulnerability.patch - Patch | |
References | () http://osvdb.org/31618 - | |
References | () http://secunia.com/advisories/23880 - | |
References | () http://secunia.com/advisories/23906 - | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2007:004 - | |
References | () http://www.securityfocus.com/bid/21959 - | |
References | () http://www.ubuntu.com/usn/usn-412-1 - | |
References | () http://www.vupen.com/english/advisories/2007/0117 - | |
References | () http://www.vupen.com/english/advisories/2007/0118 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/31383 - |
Information
Published : 2007-01-10 00:28
Updated : 2025-04-09 00:30
NVD link : CVE-2007-0159
Mitre link : CVE-2007-0159
CVE.ORG link : CVE-2007-0159
JSON object : View
Products Affected
geoip
- geoip
CWE