CVE-2010-0962

The FTP proxy server in Apple AirPort Express, AirPort Extreme, and Time Capsule with firmware 7.5 does not restrict the IP address and port specified in a PORT command from a client, which allows remote attackers to leverage intranet FTP servers for arbitrary TCP forwarding via a crafted PORT command.
Configurations

Configuration 1 (hide)

OR cpe:2.3:h:apple:airport_express:7.5:*:*:*:*:*:*:*
cpe:2.3:h:apple:airport_extreme:7.5:*:*:*:*:*:*:*
cpe:2.3:h:apple:time_capsule:7.5:*:*:*:*:*:*:*

History

21 Nov 2024, 01:13

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2010/Mar/106 - () http://seclists.org/fulldisclosure/2010/Mar/106 -
References () http://www.securityfocus.com/archive/1/509867/100/0/threaded - () http://www.securityfocus.com/archive/1/509867/100/0/threaded -
References () http://www.securityfocus.com/archive/1/509974/100/0/threaded - () http://www.securityfocus.com/archive/1/509974/100/0/threaded -
References () http://www.securityfocus.com/bid/38543 - Exploit () http://www.securityfocus.com/bid/38543 - Exploit
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/56701 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/56701 -

Information

Published : 2010-03-10 22:30

Updated : 2024-11-21 01:13


NVD link : CVE-2010-0962

Mitre link : CVE-2010-0962

CVE.ORG link : CVE-2010-0962


JSON object : View

Products Affected

apple

  • airport_express
  • time_capsule
  • airport_extreme
CWE
CWE-264

Permissions, Privileges, and Access Controls