CAM framework is patched against hackers


CAM framework is patched against hackers

Antony Savvas

CA has acted to patch security flaws in its CA Message Queuing software, which include allowing malicious attackers to trigger denial of service attacks in systems.

All CAM (CA Message Queuing) software prior to v1.07 Build 220_13 and v1.11 Build 29_13 on multiple platforms are vulnerable to attack, said CA.

One flaw opens the CAM TCP network port to potential denial of service attacks.

In addition, another flaw allows attackers to create a buffer overflow in the software to allow them to execute their own malicious code. A third vulnerability allows attackers to potentially take control of systems.

CAM is a messaging framework used for various CA applications, including CA Advantage Data Transport, CA CleverPath, CA BrightStor Portal, CA eTrust Admin and CA Unicenter.

The CA advisory on the flaws is available here:

Email Alerts

Register now to receive IT-related news, guides and more, delivered to your inbox.
By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

COMMENTS powered by Disqus  //  Commenting policy