The casrvc program in CA Common Services, as used in CA Client Automation 12.8, 12.9, and 14.0; CA SystemEDGE 5.8.2 and 5.9; CA Systems Performance for Infrastructure Managers 12.8 and 12.9; CA Universal Job Management Agent 11.2; CA Virtual Assurance for Infrastructure Managers 12.8 and 12.9; CA Workload Automation AE 11, 11.3, 11.3.5, and 11.3.6 on AIX, HP-UX, Linux, and Solaris allows local users to modify arbitrary files and consequently gain root privileges via vectors related to insufficient validation.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.securityfocus.com/archive/1/540062/100/0/threaded | Third Party Advisory VDB Entry | 
| http://www.securityfocus.com/bid/95819 | Third Party Advisory VDB Entry | 
| http://www.securitytracker.com/id/1037730 | Third Party Advisory VDB Entry | 
| https://www.ca.com/us/services-support/ca-support/ca-support-online/product-content/recommended-reading/security-notices/ca20170126-01--security-notice-for-ca-common-services-casrvc.html | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
            
            
 
  | 
    
History
                    No history.
Information
                Published : 2017-01-27 22:59
Updated : 2021-11-09 17:48
NVD link : CVE-2016-9795
Mitre link : CVE-2016-9795
CVE.ORG link : CVE-2016-9795
JSON object : View
Products Affected
                ibm
- aix
 
broadcom
- client_automation
 - systems_performance_for_infrastructure_managers
 - ca_workload_automation_ae
 - systemedge
 
ca
- virtual_assurance_for_infrastructure_managers
 - universal_job_management_agent
 
hp
- hp-ux
 
linux
- linux_kernel
 
oracle
- solaris
 
CWE
                
                    
                        
                        CWE-20
                        
            Improper Input Validation
