If JP1/Cm2/Hierarchical Viewer (abbreviated hereafter to HV) receives data unexpectedly,
an HV process might stop, and the Web-based interface for HV might not be usable.
Note that JP1/Cm2/Hierarchical Viewer is for Japanese systems only. JP1 is an abbreviation for Job Management Partner 1.
Vulnerability ID
HS07-021
Vulnerability description
If HV receives data unexpectedly, an HV process might stop, and the Web-based interface for HV might not be usable.
Affected products and versions are listed below.
Please upgrade your version to the appropriate version, or apply the Workarounds.
Affected products
The information is organized under the following headings:
(Example)
Product name: Gives the name of the affected product.
Version:
- Platform
- Gives the affected version.
Product name: JP1/Cm2/Hierarchical Viewer
Version(s):
- Windows
- 06-00 to 06-71-/B
- HP-UX
- 06-00 to 06-71-/B
- Solaris
- 06-00 to 06-71-/B
Fixed products
The information is organized under the following headings:
(Example)
Product name: Gives the name of the fixed product.
Version:
- Platform
- Gives the fixed version, and release date.
Scheduled version:
- Platform
- Gives the fixed version scheduled to be released.
Product name: JP1/Cm2/Hierarchical Viewer
Version(s)(*1):
- Windows
- 07-00(*2)
- HP-UX
- 07-00(*3)
- Solaris
- 07-00(*4)
For details on the fixed products, contact your Hitachi support service representative.
- *1
- JP1/Cm2/Network Node Manager (abbreviated hereafter to NNM), which is essential for HV operation, and products that operate while linked to NNM might also have to be upgraded. For details on the appropriate version of each product, refer to the applicable documentation for that product.
- *2
- Please upgrade to version 07-00 for P-2442-6X74 and later models.
- *3
- Please upgrade to version 07-00 for P-1B42-6X71 and later models.
- *4
- Please upgrade to version 07-00 for P-9D42-6X71 and later models.
Workarounds
Please carry out the following workaround until the fixed modules are available:
- Set filtering rules on the OS, firewall, or router so that only reliable hosts can access the TCP ports used by the Web-based interface for JP1/Cm2/Hierarchical Viewer.
Revision history
- July 31, 2007
- This page is released.
- Hitachi, Ltd. (hereinafter referred to as "Hitachi") tries to provide accurate information about security countermeasures. However, since information about security problems constantly changes, the contents of these Web pages are subject to change without prior notice. When referencing information, please confirm that you are referencing the latest information.
- The Web pages include information about products that are developed by non-Hitachi software developers. Vulnerability information about those products is based on the information provided or disclosed by those developers. Although Hitachi is careful about the accuracy and completeness of this information, the contents of the Web pages may change depending on the changes made by the developers.
- The Web pages are intended to provide vulnerability information only, and Hitachi shall not have any legal responsibility for the information contained in them. Hitachi shall not be liable for any consequences arising out of or in connection with the security countermeasures or other actions that you will take or have taken (or not taken) by yourself.
- The links to other web sites are valid at the time of the release of the page. Although Hitachi makes an effort to maintain the links, Hitachi cannot guarantee their permanent availability.