First published: Wed Jun 17 2015(Updated: )
CA Common Services, as used in CA Client Automation r12.5 SP01, r12.8, and r12.9; CA Network and Systems Management r11.0, r11.1, and r11.2; CA NSM Job Management Option r11.0, r11.1, and r11.2; CA Universal Job Management Agent; CA Virtual Assurance for Infrastructure Managers (aka SystemEDGE) 12.6, 12.7, 12.8, and 12.9; and CA Workload Automation AE r11, r11.3, r11.3.5, and r11.3.6 on UNIX, does not properly perform bounds checking, which allows local users to gain privileges via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom Client Automation | =r12.5-sp01 | |
Broadcom Client Automation | =r12.8 | |
Broadcom Client Automation | =r12.9 | |
CA Network and Systems Management | =r11.2 | |
CA NSM Job Management Option | =r11.0 | |
CA NSM Job Management Option | =r11.1 | |
CA NSM Job Management Option | =r11.2 | |
CA Universal Job Management Agent | ||
CA Virtual Assurance for Infrastructure Managers | =12.6 | |
CA Virtual Assurance for Infrastructure Managers | =12.7 | |
CA Virtual Assurance for Infrastructure Managers | =12.8 | |
CA Virtual Assurance for Infrastructure Managers | =12.9 | |
Broadcom CA Workload Automation AE | =r11 | |
Broadcom CA Workload Automation AE | =r11.3 | |
Broadcom CA Workload Automation AE | =r11.3.5 | |
Broadcom CA Workload Automation AE | =r11.3.6 | |
HPE HP-UX | ||
IBM AIX | ||
Linux Kernel | ||
Oracle Solaris and Zettabyte File System (ZFS) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3317 has a high severity rating due to potential exploitability in the affected CA software.
To fix CVE-2015-3317, users should apply the latest security patches provided by Broadcom for the affected software versions.
CVE-2015-3317 affects multiple versions of CA Client Automation, CA Network and Systems Management, and other specific CA products.
Exploiting CVE-2015-3317 could allow unauthorized access to sensitive information or system resources.
While the best mitigation for CVE-2015-3317 is to update, if immediate update is not possible, restricting access to the affected systems may serve as a temporary workaround.