High severity7.8NVD Advisory· Published Jan 27, 2017· Updated May 13, 2026
CVE-2016-9795
CVE-2016-9795
Description
The casrvc program in CA Common Services, as used in CA Client Automation 12.8, 12.9, and 14.0; CA SystemEDGE 5.8.2 and 5.9; CA Systems Performance for Infrastructure Managers 12.8 and 12.9; CA Universal Job Management Agent 11.2; CA Virtual Assurance for Infrastructure Managers 12.8 and 12.9; CA Workload Automation AE 11, 11.3, 11.3.5, and 11.3.6 on AIX, HP-UX, Linux, and Solaris allows local users to modify arbitrary files and consequently gain root privileges via vectors related to insufficient validation.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- www.securityfocus.com/archive/1/540062/100/0/threadednvdThird Party AdvisoryVDB Entry
- www.securityfocus.com/bid/95819nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1037730nvdThird Party AdvisoryVDB Entry
- www.ca.com/us/services-support/ca-support/ca-support-online/product-content/recommended-reading/security-notices/ca20170126-01--security-notice-for-ca-common-services-casrvc.htmlnvdVendor Advisory
News mentions
0No linked articles in our index yet.