CVE-2007-0159

Source
https://nvd.nist.gov/vuln/detail/CVE-2007-0159
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2007-0159.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2007-0159
Published
2007-01-10T00:28:00Z
Modified
2024-11-21T00:25:07Z
Summary
[none]
Details

Directory traversal vulnerability in the GeoIPupdatedatabasegeneral function in libGeoIP/GeoIPUpdate.c in GeoIP 1.4.0 allows remote malicious update servers (possibly only update.maxmind.com) to overwrite arbitrary files via a .. (dot dot) in the database filename, which is returned by a request to app/updategetfilename.

References

Affected packages

Debian:11 / geoip

Package

Name
geoip
Purl
pkg:deb/debian/geoip?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.17-1.1

Ecosystem specific

{
    "urgency": "low"
}

Debian:12 / geoip

Package

Name
geoip
Purl
pkg:deb/debian/geoip?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.17-1.1

Ecosystem specific

{
    "urgency": "low"
}

Debian:13 / geoip

Package

Name
geoip
Purl
pkg:deb/debian/geoip?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.17-1.1

Ecosystem specific

{
    "urgency": "low"
}