Directory traversal vulnerability in the GeoIP_update_database_general function in libGeoIP/GeoIPUpdate.c in GeoIP 1.4.0 allows remote malicious update servers (possibly only update.maxmind.com) to overwrite arbitrary files via a .. (dot dot) in the database filename, which is returned by a request to app/update_getfilename.
https://exchange.xforce.ibmcloud.com/vulnerabilities/31383
http://www.vupen.com/english/advisories/2007/0118
http://www.vupen.com/english/advisories/2007/0117
http://www.ubuntu.com/usn/usn-412-1
http://www.securityfocus.com/bid/21959
http://www.mandriva.com/security/advisories?name=MDKSA-2007:004
http://secunia.com/advisories/23906
http://secunia.com/advisories/23880
http://arctic.org/~dean/patches/GeoIP-1.4.0-update-vulnerability.patch