Skip to main content

Hitachi
Contact UsContact Us

Update: November 4, 2009

In an IPv6 environment, a client, whose access is normally limited, is sometimes granted access to Hitachi Device Manager server.

Vulnerability ID

HS09-013

Vulnerability description

When the following conditions are met, a client, whose access is normally limited, is sometimes granted access to Hitachi Device Manager server:

  • IPv6 addresses are used for communication between Hitachi Device Manager server and the client.
  • Access restrictions for Hitachi Device Manager clients are specified in CIDR format.

This problem does not occur in IPv4 environments.
Affected products and versions are listed below. Please upgrade your version to the appropriate version, or apply the Workarounds.

Affected products

The information is organized under the following headings:

(Example)
Product name: Gives the name of the affected product.

Version:

Platform
Gives the affected version.

Product name: JP1/HiCommand Device Manager

Version(s):

Windows
5.9.0-00 to 5.9.0-08
Linux
5.9.0-00 to 5.9.0-08
Solaris(SPARC)
5.9.0-00 to 5.9.0-08
Solaris(x64)
5.9.0-00 to 5.9.0-08

Product name: Hitachi Device Manager Software

Version(s):

Windows
6.0.0-00 to 6.0.0-06, 6.1.0-00 to 6.1.0-02, 6.1.1-00 to 6.1.1-03
Linux
6.0.0-00 to 6.0.0-06, 6.1.0-00 to 6.1.0-02, 6.1.1-00 to 6.1.1-03
Solaris(SPARC)
6.0.0-00 to 6.0.0-06, 6.1.0-00 to 6.1.0-02, 6.1.1-00 to 6.1.1-03
Solaris(x64)
6.0.0-00 to 6.0.0-06, 6.1.0-00 to 6.1.0-02, 6.1.1-00 to 6.1.1-03

Fixed products

The information is organized under the following headings:

(Example)
Product name: Gives the name of the fixed product.

Version:

Platform
Gives the fixed version, and release date.

Scheduled version(s):

Platform
Gives the fixed version scheduled to be released.

Product name: Hitachi Device Manager Software

Version(s):

Windows
6.1.1-04 July 21, 2009
6.2.0-00 June 16, 2009
Linux
6.1.1-04 July 21, 2009
6.2.0-00 June 16, 2009
Solaris(SPARC)
6.1.1-04 July 21, 2009
6.2.0-00 June 16, 2009
Solaris(x64)
6.1.1-04 July 21, 2009
6.2.0-00 June 16, 2009

For details on the fixed products, contact your Hitachi support service representative.

Workarounds

Please carry out the following workarounds until the fixed modules are available:

  1. Specify client access restrictions for each IP address.

Revision history

November 4, 2009
Information about fixed products is updated.
September 9, 2009
This page is released.
  • Hitachi, Ltd. (hereinafter referred to as "Hitachi") tries to provide accurate information about security countermeasures. However, since information about security problems constantly changes, the contents of these Web pages are subject to change without prior notice. When referencing information, please confirm that you are referencing the latest information.
  • The Web pages include information about products that are developed by non-Hitachi software developers. Vulnerability information about those products is based on the information provided or disclosed by those developers. Although Hitachi is careful about the accuracy and completeness of this information, the contents of the Web pages may change depending on the changes made by the developers.
  • The Web pages are intended to provide vulnerability information only, and Hitachi shall not have any legal responsibility for the information contained in them. Hitachi shall not be liable for any consequences arising out of or in connection with the security countermeasures or other actions that you will take or have taken (or not taken) by yourself.
  • The links to other web sites are valid at the time of the release of the page. Although Hitachi makes an effort to maintain the links, Hitachi cannot guarantee their permanent availability.