641
VMScore

CVE-2016-9795

Published: 27/01/2017 Updated: 09/11/2021
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The casrvc program in CA Common Services, as used in CA Client Automation 12.8, 12.9, and 14.0; CA SystemEDGE 5.8.2 and 5.9; CA Systems Performance for Infrastructure Managers 12.8 and 12.9; CA Universal Job Management Agent 11.2; CA Virtual Assurance for Infrastructure Managers 12.8 and 12.9; CA Workload Automation AE 11, 11.3, 11.3.5, and 11.3.6 on AIX, HP-UX, Linux, and Solaris allows local users to modify arbitrary files and consequently gain root privileges via vectors related to insufficient validation.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

broadcom ca_workload_automation_ae 11.0

broadcom ca_workload_automation_ae 11.3

broadcom ca_workload_automation_ae 11.3.5

broadcom ca_workload_automation_ae 11.3.6

broadcom client_automation 12.8

broadcom client_automation 12.9

broadcom client_automation 14.0

broadcom systemedge 5.8.2

broadcom systemedge 5.9

broadcom systems_performance_for_infrastructure_managers 12.8

broadcom systems_performance_for_infrastructure_managers 12.9

ca universal_job_management_agent 11.2

ca virtual_assurance_for_infrastructure_managers 12.8

ca virtual_assurance_for_infrastructure_managers 12.9

Github Repositories

Revisited CVE-2016-9795 privilege escalation (casrvc binary from CA Common Services suite)

CA Common Services privilege escalation (CVE-2016-9795) revisited Description In one of my pentests, I stumbled across the casrvc SUID binary (which is part of CA Common Services suite) As I found out, the binary is vulnerable to local privilege escalation As a matter of fact, a public CVE (CVE-2016-9795) was already attributed to this vulnerability by NCC group The vulnerab