An insecure file access vulnerability exists in CA Client Automation 14.0, 14.1, 14.2, and 14.3 Agent for Windows that can allow a local attacker to gain escalated privileges.
The product, when opening a file or directory, does not sufficiently handle when the name is associated with a hard link to a target that is outside of the intended control sphere. This could allow an attacker to cause the product to operate on unauthorized files.
Link | Tags |
---|---|
https://techdocs.broadcom.com/us/product-content/recommended-reading/security-notices/CA20191218-01-security-notice-for-ca-client-automation-agent-for-windows.html | vendor advisory |
https://seclists.org/bugtraq/2019/Dec/41 | third party advisory mailing list |
http://packetstormsecurity.com/files/155758/CA-Client-Automation-14.x-Privilege-Escalation.html | vdb entry third party advisory |
http://seclists.org/fulldisclosure/2020/Jan/5 | third party advisory mailing list |