Vulnerability Details : CVE-2002-1296
Directory traversal vulnerability in priocntl system call in Solaris does allows local users to execute arbitrary code via ".." sequences in the pc_clname field of a pcinfo_t structure, which cause priocntl to load a malicious kernel module.
Vulnerability category: Directory traversalExecute code
Products affected by CVE-2002-1296
- cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*
- cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*
- cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*
- cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*
- cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*
- cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*
- cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*
Threat overview for CVE-2002-1296
Top countries where our scanners detected CVE-2002-1296
Top open port discovered on systems with this issue
554
IPs affected by CVE-2002-1296 2
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2002-1296!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2002-1296
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 24 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2002-1296
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST |
References for CVE-2002-1296
-
http://www.iss.net/security_center/static/10717.php
Vendor Advisory
-
http://sunsolve.Sun.COM/pub-cgi/retrieve.pl?doc=fsalert/49131
Patch;Vendor Advisory
-
http://www.kb.cert.org/vuls/id/683673
Patch;Third Party Advisory;US Government Resource
-
http://www.securityfocus.com/bid/6262
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3637
-
http://marc.info/?l=bugtraq&m=103842619803173&w=2
Jump to