CVE-2016-9795
CVSS7.2
发布时间 :2017-01-27 17:59:02
修订时间 :2017-07-24 21:29:04
NMPS    

[原文]The casrvc program in CA Common Services, as used in CA Client Automation 12.8, 12.9, and 14.0; CA SystemEDGE 5.8.2 and 5.9; CA Systems Performance for Infrastructure Managers 12.8 and 12.9; CA Universal Job Management Agent 11.2; CA Virtual Assurance for Infrastructure Managers 12.8 and 12.9; CA Workload Automation AE 11, 11.3, 11.3.5, and 11.3.6 on AIX, HP-UX, Linux, and Solaris allows local users to modify arbitrary files and consequently gain root privileges via vectors related to insufficient validation.


[CNNVD]CNNVD数据暂缺。


[机译]译文暂缺.

- CVSS (基础分值)

CVSS分值: 7.2 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-20 [输入验证不恰当]

- CPE (受影响的平台与产品)

cpe:/a:ca:systems_performance_for_infrastructure_managers:12.8
cpe:/a:ca:workload_automation_ae:11.3
cpe:/a:ca:workload_automation_ae:11.0
cpe:/a:ca:client_automation:14.0
cpe:/a:ca:virtual_assurance_for_infrastructure_managers:12.8
cpe:/a:ca:virtual_assurance_for_infrastructure_managers:12.9
cpe:/a:ca:universal_job_management_agent:11.2
cpe:/a:ca:systems_performance_for_infrastructure_managers:12.9
cpe:/a:ca:client_automation:12.8
cpe:/a:ca:workload_automation_ae:11.3.5
cpe:/a:ca:systemedge:5.9
cpe:/a:ca:workload_automation_ae:11.3.6
cpe:/a:ca:systemedge:5.8.2
cpe:/a:ca:client_automation:12.9

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9795
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-9795
(官方数据源) NVD

- 其它链接及资源

http://www.securityfocus.com/archive/1/archive/1/540062/100/0/threaded
(VENDOR_ADVISORY)  BUGTRAQ  20170126 CA20170126-01: Security Notice for CA Common Services casrvc
http://www.securityfocus.com/bid/95819
(VENDOR_ADVISORY)  BID  95819
http://www.securitytracker.com/id/1037730
(UNKNOWN)  SECTRACK  1037730
https://www.ca.com/us/services-support/ca-support/ca-support-online/product-content/recommended-reading/security-notices/ca20170126-01--security-notice-for-ca-common-services-casrvc.html
(VENDOR_ADVISORY)  CONFIRM  https://www.ca.com/us/services-support/ca-support/ca-support-online/product-content/recommended-reading/security-notices/ca20170126-01--security-notice-for-ca-common-services-casrvc.html

- 漏洞信息 (F140789)

CA Common Services casrvc Privilege Escalation (PacketStormID:F140789)
2017-01-28 00:00:00
Kevin Kotas  www3.ca.com
advisory,arbitrary,local,root
linux,solaris,aix,hpux
CVE-2016-9795
[点击下载]

CA Technologies support is alerting customers about a medium risk vulnerability that may allow a local attacker to gain additional privileges with products using CA Common Services running on the AIX, HP-UX, Linux, and Solaris platforms. The vulnerability, CVE-2016-9795, occurs due to insufficient validation by the casrvc program. A local unprivileged user can exploit the vulnerability to modify arbitrary files, which can potentially allow a local attacker to gain root level access.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

CA20170126-01: Security Notice for CA Common Services casrvc

Issued: January 26, 2017
Last Updated: January 26, 2017

CA Technologies support is alerting customers about a medium risk
vulnerability that may allow a local attacker to gain additional
privileges with products using CA Common Services running on the AIX,
HP-UX, Linux, and Solaris platforms. The vulnerability, CVE-2016-9795,
occurs due to insufficient validation by the casrvc program. A local
unprivileged user can exploit the vulnerability to modify arbitrary
files, which can potentially allow a local attacker to gain root
level access.

Risk Rating

Medium

Platforms

AIX, HP-UX, Linux, Solaris

Affected Products

CA Common Services

Products that include CA Common Services:

CA Client Automation 12.8, 12.9, 14.0
CA SystemEDGE 5.8.2, 5.9
CA Systems Performance for Infrastructure Managers 12.8, 12.9
CA Universal Job Management Agent 11.2
CA Virtual Assurance for Infrastructure Managers 12.8, 12.9
CA Workload Automation AE 11, 11.3, 11.3.5, 11.3.6

Unaffected Products

CA Common Services for z/OS
CA Common Services on the Windows platform

How to determine if the installation is affected

Customers may use the applyptf or equivalent program to determine if
the patch from the solution section is present.

Solution

CA technologies published a fix to resolve the vulnerability for all
affected products.

CA Client Automation
CA SystemEDGE
CA Systems Performance for Infrastructure Managers
CA Universal Job Management Agent
CA Virtual Assurance for Infrastructure Managers
CA Workload Automation AE

Install the following fix for CA Common Services on AIX, HP-UX,
Linux, or Solaris:

RO93360

References

CVE-2016-9795 - CA Common Services casrvc local privilege escalation

Acknowledgement

CVE-2016-9795 - Craig Blackie, NCC Group

Version 1.0: Initial Release

If additional information is required, please contact CA Technologies
Support at https://support.ca.com/

If you discover a vulnerability in CA Technologies products, please
report your findings to the CA Technologies Product Vulnerability
Response Team at vuln <AT> ca.com

Security Notices and PGP key
support.ca.com/irj/portal/anonymous/phpsbpldgpg
www.ca.com/us/support/ca-support-online/documents.aspx?id=177782

Regards,

Kevin Kotas
Vulnerability Response Director
CA Technologies Product Vulnerability Response Team

Copyright (c) 2017 CA. 520 Madison Avenue, 22nd Floor, New York, NY
10022.  All other trademarks, trade names, service marks, and logos
referenced herein belong to their respective companies.

-----BEGIN PGP SIGNATURE-----
Charset: utf-8
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=kfYM
-----END PGP SIGNATURE-----
    

- 漏洞信息

CA Common Services CVE-2016-9795 Local Privilege Escalation Vulnerability
Design Error 95819
No Yes
2017-01-26 12:00:00 2017-01-27 01:08:00
Craig Blackie, NCC Group.

- 受影响的程序版本

Computer Associates Workload Automation AE r11.3
Computer Associates Workload Automation AE R11
Ca Virtual Assurance for Infrastructure Managers 12.9
Ca Virtual Assurance for Infrastructure Managers 12.8
Ca Universal Job Management Agent 11.2
Ca Systems Performance for Infrastructure Managers 12.9
Ca Systems Performance for Infrastructure Managers 12.8
Ca SystemEDGE 5.8.2
Ca SystemEDGE 5.9
Ca Client Automation r14.0
Ca Client Automation r12.9
Ca Client Automation r12.8

- 漏洞讨论

CA Common Services is prone to a local privilege-escalation vulnerability.

A local attacker can exploit this issue to gain root privileges.

- 漏洞利用

Currently, we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: vuldb@securityfocus.com.

- 解决方案

Updates are available. Please see the references or vendor advisory for more information.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站