The casrvc program in CA Common Services, as used in CA Client Automation 12.8, 12.9, and 14.0; CA SystemEDGE 5.8.2 and 5.9; CA Systems Performance for Infrastructure Managers 12.8 and 12.9; CA Universal Job Management Agent 11.2; CA Virtual Assurance for Infrastructure Managers 12.8 and 12.9; CA Workload Automation AE 11, 11.3, 11.3.5, and 11.3.6 on AIX, HP-UX, Linux, and Solaris allows local users to modify arbitrary files and consequently gain root privileges via vectors related to insufficient validation.
References
Link | Resource |
---|---|
https://www.ca.com/us/services-support/ca-support/ca-support-online/product-content/recommended-reading/security-notices/ca20170126-01--security-notice-for-ca-common-services-casrvc.html | Vendor Advisory |
http://www.securityfocus.com/bid/95819 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1037730 | Third Party Advisory VDB Entry |
http://www.securityfocus.com/archive/1/540062/100/0/threaded | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2017-01-27 14:59
Updated : 2021-11-09 09:48
NVD link : CVE-2016-9795
Mitre link : CVE-2016-9795
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
broadcom
- systems_performance_for_infrastructure_managers
- client_automation
- ca_workload_automation_ae
- systemedge
ca
- virtual_assurance_for_infrastructure_managers
- universal_job_management_agent
ibm
- aix
hp
- hp-ux
linux
- linux_kernel
oracle
- solaris