The casrvc program in CA Common Services, as used in CA Client Automation 12.8, 12.9, and 14.0; CA SystemEDGE 5.8.2 and 5.9; CA Systems Performance for Infrastructure Managers 12.8 and 12.9; CA Universal Job Management Agent 11.2; CA Virtual Assurance for Infrastructure Managers 12.8 and 12.9; CA Workload Automation AE 11, 11.3, 11.3.5, and 11.3.6 on AIX, HP-UX, Linux, and Solaris allows local users to modify arbitrary files and consequently gain root privileges via vectors related to insufficient validation.
References
Link | Resource |
---|---|
http://www.securityfocus.com/archive/1/540062/100/0/threaded | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/95819 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1037730 | Third Party Advisory VDB Entry |
https://www.ca.com/us/services-support/ca-support/ca-support-online/product-content/recommended-reading/security-notices/ca20170126-01--security-notice-for-ca-common-services-casrvc.html | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2017-01-27T22:01:00
Updated: 2018-10-09T18:57:01
Reserved: 2016-12-02T00:00:00
Link: CVE-2016-9795
JSON object: View
NVD Information
Status : Analyzed
Published: 2017-01-27T22:59:02.100
Modified: 2021-11-09T17:48:31.997
Link: CVE-2016-9795
JSON object: View
Redhat Information
No data.
CWE