Description
The casrvc program in CA Common Services, as used in CA Client Automation 12.8, 12.9, and 14.0; CA SystemEDGE 5.8.2 and 5.9; CA Systems Performance for Infrastructure Managers 12.8 and 12.9; CA Universal Job Management Agent 11.2; CA Virtual Assurance for Infrastructure Managers 12.8 and 12.9; CA Workload Automation AE 11, 11.3, 11.3.5, and 11.3.6 on AIX, HP-UX, Linux, and Solaris allows local users to modify arbitrary files and consequently gain root privileges via vectors related to insufficient validation.
Published: 2017-01-27
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2016-10596 The casrvc program in CA Common Services, as used in CA Client Automation 12.8, 12.9, and 14.0; CA SystemEDGE 5.8.2 and 5.9; CA Systems Performance for Infrastructure Managers 12.8 and 12.9; CA Universal Job Management Agent 11.2; CA Virtual Assurance for Infrastructure Managers 12.8 and 12.9; CA Workload Automation AE 11, 11.3, 11.3.5, and 11.3.6 on AIX, HP-UX, Linux, and Solaris allows local users to modify arbitrary files and consequently gain root privileges via vectors related to insufficient validation.
History

No history.

Subscriptions

Broadcom Ca Workload Automation Ae Client Automation Systemedge Systems Performance For Infrastructure Managers
Ca Universal Job Management Agent Virtual Assurance For Infrastructure Managers
Hp Hp-ux
Ibm Aix
Linux Linux Kernel
Oracle Solaris
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T02:59:03.377Z

Reserved: 2016-12-02T00:00:00.000Z

Link: CVE-2016-9795

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-01-27T22:59:02.100

Modified: 2025-04-20T01:37:25.860

Link: CVE-2016-9795

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses