Dear CA Customer:
The purpose of this Advisory is to inform you of a potential problem that has been recently identified with Client Automation. Please read the information provided below and follow the instructions in order to avoid being impacted by this problem.
PRODUCT AFFECTED: CA Client Automaton RELEASE: r12.9, r14.0
The identified vulnerability is masquerading the UDP data packet as a TCP data packet and being sent to CAM server.
CAM server crashes
Generally CAM dependent product start back the CAM server, if the CAM server is down, we may encounter potential loss in information, as messages are being sent and received by applications.
We recommend installing the latest version of CAM which is CAM-1.14 Build 4 which addresses the problem. The below updated versions CAM may be found on Support.Ca.Com
T5SM102 (CAM-1.14Build4 Installer) - Windows installer
T5SM109 (CAM-1.14B4 for Solaris x86 AMD64) - Solaris x86/AMD64 installer
T5SM110 (CAM1.14 B4 install Solaris SPARC) - Solaris SPARC installer
T5SM111 (CAM1.14 B4 installer for AIX) - AIX installer
T5SM119 (CAM1.14 B4 install for HPUX) - HPUX installer
T5SM113 (CAM-1.14B4 install for Linux) - Linux x86/IA64 installer
If you have any questions about this Advisory, please contact CA Support.
CA Support Team