Dear CA Customer:
The purpose of this Advisory is to inform you of a potential problem that has been recently identified with Client Automation. Please read the information provided below and follow the instructions in order to avoid being impacted by this problem.
PRODUCT AFFECTED: CA Client Automaton RELEASE: r12.9, r14.0
PROBLEM DESCRIPTION:
The identified vulnerability is masquerading the UDP data packet as a TCP data packet and being sent to CAM server.
SYMPTOMS:
CAM server crashes
IMPACT:
Generally CAM dependent product start back the CAM server, if the CAM server is down, we may encounter potential loss in information, as messages are being sent and received by applications.
PROBLEM RESOLUTION:
We recommend installing the latest version of CAM which is CAM-1.14 Build 4 which addresses the problem. The below updated versions CAM may be found on Support.Ca.Com
.
T5SM102 (CAM-1.14Build4 Installer) - Windows installer | RO94579 |
T5SM109 (CAM-1.14B4 for Solaris x86 AMD64) - Solaris x86/AMD64 installer | RO94584 |
T5SM110 (CAM1.14 B4 install Solaris SPARC) - Solaris SPARC installer | RO94586 |
T5SM111 (CAM1.14 B4 installer for AIX) - AIX installer | RO94587 |
T5SM119 (CAM1.14 B4 install for HPUX) - HPUX installer | RO94609 |
T5SM113 (CAM-1.14B4 install for Linux) - Linux x86/IA64 installer | RO94610 |
If you have any questions about this Advisory, please contact CA Support.
Thank you,
CA Support Team