Vulnerability Details : CVE-2002-0679
Buffer overflow in Common Desktop Environment (CDE) ToolTalk RPC database server (rpc.ttdbserverd) allows remote attackers to execute arbitrary code via an argument to the _TT_CREATE_FILE procedure.
Vulnerability category: OverflowExecute code
Threat overview for CVE-2002-0679
Top countries where our scanners detected CVE-2002-0679
Top open port discovered on systems with this issue
554
IPs affected by CVE-2002-0679 2
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2002-0679!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2002-0679
Probability of exploitation activity in the next 30 days: 1.72%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 87 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2002-0679
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
References for CVE-2002-0679
-
http://www-1.ibm.com/support/search.wss?rs=0&q=IY32793&apar=only
-
http://www-1.ibm.com/support/search.wss?rs=0&q=IY32792&apar=only
-
http://www.kb.cert.org/vuls/id/387387
Patch;Third Party Advisory;US Government Resource
-
http://www.cert.org/advisories/CA-2002-26.html
US Government Resource
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A177
-
http://www.iss.net/security_center/static/9822.php
- http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0207-199
-
http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F46366&zone_32=category%3Asecurity
-
http://www.securityfocus.com/bid/5444
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A192
-
http://marc.info/?l=bugtraq&m=102917002523536&w=2
Products affected by CVE-2002-0679
- cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*
- cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*
- cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*
- cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*
- cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*
- cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*
- cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*
- cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*
- cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*
- cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*
- cpe:2.3:o:ibm:aix:4.3.3:*:*:*:*:*:*:*
- cpe:2.3:o:ibm:aix:5.1:*:*:*:*:*:*:*
- cpe:2.3:a:caldera:unixware:7.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:caldera:unixware:7.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:caldera:unixware:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:caldera:openunix:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:5.1:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:4.0f:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:4.0g:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:5.0a:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:5.1a:*:*:*:*:*:*:*
- cpe:2.3:a:xi_graphics:dextop:2.1:*:*:*:*:*:*:*