exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

CA Common Services Privilege Escalation

CA Common Services Privilege Escalation
Posted Jun 5, 2015
Authored by Kevin Kotas | Site www3.ca.com

CA Technologies Support is alerting customers to multiple potential risks with products that bundle CA Common Services on Unix/Linux platforms. A local attacker may exploit these vulnerabilities to gain additional privileges.

tags | advisory, local, vulnerability
systems | linux, unix
advisories | CVE-2015-3316, CVE-2015-3317, CVE-2015-3318
SHA-256 | 5048295cdec92e29b7a34683d31ae5c982b6298a4a6c09ee5f965e0d77decae8

CA Common Services Privilege Escalation

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----

CA20150604-01: Security Notice for CA Common Services

Issued: June 4, 2015

CA Technologies Support is alerting customers to multiple potential
risks with products that bundle CA Common Services on Unix/Linux
platforms. A local attacker may exploit these vulnerabilities to
gain additional privileges.

The first vulnerability, CVE-2015-3316, occurs due to insecure use of
an environment variable which may enable a local attacker to gain
privileged access.

The second vulnerability, CVE-2015-3317, occurs due to multiple
instances of insufficient bounds checking which can potentially
allow a local attacker to gain privileged access.

The third vulnerability, CVE-2015-3318, occurs due to inadequate
validation of a variable which can possibly allow a local attacker
to gain privileged access.

Risk Rating

Medium

Platform

AIX, HP-UX, Linux, Solaris

Affected Products

CA Common Services, all versions on AIX, HP-UX, Linux, Solaris

CA Technologies products that bundle this software include:

CA Client Automation r12.5 SP01, r12.8, r12.9 on AIX, HP-UX, Linux,
Solaris

CA Network and Systems Management r11.0, r11.1, r11.2 on AIX, HP-UX,
Linux, Solaris

CA NSM Job Management Option r11.0, r11.1, r11.2 on AIX, HP-UX,
Linux, Solaris

CA Universal Job Management Agent on AIX, HP-UX, Linux, Solaris

CA Virtual Assurance for Infrastructure Managers (SystemEDGE) 12.6,
12.7, 12.8, 12.9 on AIX, HP-UX, Linux, Solaris

CA Workload Automation AE r11.3.6, r11.3.5, r11.3, r11 on AIX, HP-UX,
Linux, Solaris

How to determine if the installation is affected

CA Client Automation,
CA Network and Systems Management,
CA NSM Job Management Option,
CA Universal Job Management Agent,
CA Workload Automation AE:

Customers can use the applyptf program to determine if the patch from
the solution section is present.

CA Virtual Assurance for Infrastructure Managers (SystemEDGE):

Customers should review the solution section.

Solution

CA Client Automation:

Linux RO80741, AIX RO80722, HP-UX RO80734, Sun SPARC RO80736,
Sun Intel RO80739

CA Network and Systems Management:

Linux RO80380, AIX RO80381, HP-UX RO80382, Sun SPARC RO80383,
Sun Intel RO80384

CA NSM Job Management Option:

Linux RO80380, AIX RO80381, HP-UX RO80382, Sun SPARC RO80383,
Sun Intel RO80384

CA Universal Job Management Agent:

Linux RO80919, AIX RO80920, HP RO80921, Sun SPARC RO80923,
Sun Intel RO80922

CA Virtual Assurance for Infrastructure Managers (SystemEDGE):

CA Virtual Assurance for Infrastructure Managers (SystemEDGE) does
not require CA Common Services. If no other CA product from this
security notice is present on the server, customers may remove the
read, write, and execute permissions from the casrvc and
libcaconfigutils.so binaries. Customers may contact support for
further guidance.

CA Workload Automation AE:

Linux RO81050, AIX RO81051, HP-UX RO81052, Sun SPARC RO81053,
Sun Intel RO81054

References

CVE-2015-3316 - CA Common Services environment variable
CVE-2015-3317 - CA Common Services multiple buffer overflows
CVE-2015-3318 - CA Common Services variable validation

Acknowledgement

Francois Goichon, Context IS

Change History

Version 1.0: Initial Release

If additional information is required, please contact CA Technologies
Support at https://support.ca.com/

If you discover a vulnerability in CA Technologies products, please
report your findings to the CA Technologies Product Vulnerability
Response Team at vuln@ca.com

Security Notices
https://support.ca.com/irj/portal/anonymous/phpsbpldgpg

Regards,

Kevin Kotas
Vulnerability Response Director
CA Technologies Product Vulnerability Response Team

Copyright (c) 2015 CA. All Rights Reserved. One CA Plaza, Islandia,
N.Y. 11749. All other trademarks, trade names, service marks, and
logos referenced herein belong to their respective companies.

-----BEGIN PGP SIGNATURE-----
Charset: utf-8

wsBVAwUBVXCoxZI1FvIeMomJAQEcNAgAgKsfQhQP7v1dZ6jmpIkHklC1fjcGIQjk
32kfT7KB4VMPJGlLM0eml711syNcmNMkbkPWuBL+qMmpNGlZW7UT91TLjhhGDOwd
2UAFnDHQSYdguEaXVndc6z3zRyz8tm+EtP22xx9h5jg1xp/jAdviajoyei6DMAKX
oQjH/djCmIVFCvWV8qqan/i+yGnWLBJ7fgwONpVRz4bcdosXd4+/wqctNrTNzKmD
qeDxhWfltRIDv5zVvrYaP3++ZQJRUIT2Pd06y5eKr6hUgSsVdZA9iLiWEcm/ZCdH
KwvfarjwZS0E28iXXyQtwWhoBLP4UflIITDYE06VfisSccFrB9wD2Q==
=+zoS
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    6 Files
  • 19
    Jul 19th
    34 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    19 Files
  • 23
    Jul 23rd
    17 Files
  • 24
    Jul 24th
    47 Files
  • 25
    Jul 25th
    31 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close