The company told users that patches are available for vulnerabilities in its CA Message (CAM) Queuing software, which could allow hackers to launch DoS attacks against servers running the software.
The second vulnerability is due to improper bounds checking performed by CAM, which allows attackers to execute arbitrary code. "The final vulnerability allows for spoofing attacks on the message queuing system to be launched to execute arbitrary commands," CA said on an advisory on its website.
Affected products include Unicenter, BrightStor and eTrust products on Windows, Linux and Unix platforms.
Earlier in the year SC Magazine reported on a number of vulnerabilities affecting security products from CA, Trend Micro and Check Point.
                               
            
            
            
            
            
            
            
                        iTnews Benchmark Security Awards 2025
                    
                        Digital Leadership Day Federal
                    
                        Government Cyber Security Showcase Federal
                    
                        Government Innovation Showcase Federal
                    
                        Digital NSW 2025 Showcase
                    


