Skip to main content

Hitachi
Contact UsContact Us

Update: February 20, 2008

A vulnerability to Denial of Service (DoS) attacks was found in SEWB/PLATFORM (abbreviated hereafter to SEWB3).

Vulnerability ID

HS08-002

Vulnerability description

When SEWB3 receives invalid data from a process other than a SEWB process, the SEWB3 messaging service might go down or hang.
This problem might occur if your system is set up as a server-client system. Both server and client messaging services are affected.
The affected products and versions are listed below. Please upgrade to the appropriate version, or apply the Workaround.

Affected products

The information is organized under the following headings:

(Example)
Product name: Gives the name of the affected product.

Version:

Platform
Gives the affected version.

Product name: SEWB3/PLATFORM

Version(s):

HI-UX/WE2(3050 SISC):
01-00 to 01-06-/A(*1)
HI-UX/WE2(3050 RISC):
01-00 to 01-06-/A(*1)
HI-UX/WE2(3050RX):
01-01 to 01-16-/F(*1), 01-06 to 01-16-/B(English version)(*1)
HP-UX(9.x):
01-00 to 01-10-/A(*1)
HP-UX(10.x):
01-11 to 01-16-/B(*1)
HP-UX(11.x):
01-16-/C to 01-16-/F(*1), 01-17 to 01-17-/F
Solaris:
01-04 to 02-14-/A(*1)
AIX:
01-10 to 02-13(*1)

Product name: SEWB3/MI-PLATFORM

Version(s):

HI-UX/WE2(3050 SISC):
01-00 to 01-06-/A(*1)
HI-UX/WE2(3050 RISC):
01-00 to 01-06-/A(*1)
HI-UX/WE2(3050RX):
01-02 to 01-16-/F(*1), 01-07 to 01-16-/B(English version)(*1)
HP-UX(9.x):
01-02 to 01-10-/A(*1)
HP-UX(10.x):
01-11 to 01-16-/B(*1)
HP-UX(11.x):
01-16-/C to 01-16-/F(*1), 01-17 to 01-17-/F
Solaris:
01-04 to 02-14-/A(*1)
AIX:
01-10 to 02-13(*1)
*1
For details about this version, contact your Hitachi support service representative.

Fixed products

The information is organized under the following headings:

(Example)
Product name: Gives the name of the fixed product.

Version:

Platform
Gives the fixed version, and release date.

Scheduled version(s):

Platform
Gives the fixed version scheduled to be released.

Product name: SEWB3/PLATFORM
Product name: SEWB3/MI-PLATFORM

Version(s):

HP-UX(11.x)
01-17-/G December 28, 2007

For details on the fixed products, contact your Hitachi support service representative.

Workarounds

Please carry out the following workaround until a fixed module is available:

  • Set filtering rules in the OS or router so that only reliable hosts can access the TCP ports used by SEWB3.

Revision history

February 20, 2008
This page is released.
  • Hitachi, Ltd. (hereinafter referred to as "Hitachi") tries to provide accurate information about security countermeasures. However, since information about security problems constantly changes, the contents of these Web pages are subject to change without prior notice. When referencing information, please confirm that you are referencing the latest information.
  • The Web pages include information about products that are developed by non-Hitachi software developers. Vulnerability information about those products is based on the information provided or disclosed by those developers. Although Hitachi is careful about the accuracy and completeness of this information, the contents of the Web pages may change depending on the changes made by the developers.
  • The Web pages are intended to provide vulnerability information only, and Hitachi shall not have any legal responsibility for the information contained in them. Hitachi shall not be liable for any consequences arising out of or in connection with the security countermeasures or other actions that you will take or have taken (or not taken) by yourself.
  • The links to other web sites are valid at the time of the release of the page. Although Hitachi makes an effort to maintain the links, Hitachi cannot guarantee their permanent availability.