Vulnerability Details : CVE-2002-0678
CDE ToolTalk database server (ttdbserver) allows local users to overwrite arbitrary files via a symlink attack on the transaction log file used by the _TT_TRANSACTION RPC procedure.
Threat overview for CVE-2002-0678
Top countries where our scanners detected CVE-2002-0678
Top open port discovered on systems with this issue
554
IPs affected by CVE-2002-0678 2
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2002-0678!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2002-0678
Probability of exploitation activity in the next 30 days: 0.74%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 79 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2002-0678
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST |
References for CVE-2002-0678
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A80
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A175
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2770
-
http://www.kb.cert.org/vuls/id/299816
Patch;Third Party Advisory;US Government Resource
-
http://www.securityfocus.com/bid/5083
- ftp://ftp.caldera.com/pub/updates/OpenUNIX/CSSA-2002-SCO.28/CSSA-2002-SCO.28.txt
-
http://www.cert.org/advisories/CA-2002-20.html
Patch;Third Party Advisory;US Government Resource
- http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0207-199
-
http://archives.neohapsis.com/archives/aix/2002-q3/0002.html
- http://marc.info/?l=bugtraq&m=102635906423617&w=2
-
http://www.iss.net/security_center/static/9527.php
-
ftp://patches.sgi.com/support/free/security/advisories/20021101-01-P
Products affected by CVE-2002-0678
- cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*
- cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*
- cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*
- cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*
- cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.0.1:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.2:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.4:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.1:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.3:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.10:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.6:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.7:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.8:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.9:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.11:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.5:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.12:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.13:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.15:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.14:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.16:*:*:*:*:*:*:*
- cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*
- cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*
- cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*
- cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*
- cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*
- cpe:2.3:o:ibm:aix:4.3.3:*:*:*:*:*:*:*
- cpe:2.3:o:ibm:aix:5.1:*:*:*:*:*:*:*
- cpe:2.3:a:caldera:unixware:7.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:caldera:unixware:7.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:caldera:unixware:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:caldera:openunix:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:5.1:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:4.0f:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:4.0g:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:5.0a:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:5.1a:*:*:*:*:*:*:*
- cpe:2.3:a:xi_graphics:dextop:2.1:*:*:*:*:*:*:*