Skip to main content

Hitachi
Contact UsContact Us

Update: March 7, 2014

A vulnerability about access control violation exists in JP1/File Transmission Server/FTP. Malicious users can exploit this vulnerability to access arbitrary directries on FTP server via FTP client.

Vulnerability ID

HS14-007

Vulnerability description

When effecting directry access control functionality, malicious authenticated login users might conduct access violation to directries on FTP server via FTP client. This vulnerability invokes a system crash, a data leakage, etc.

Affected products and versions are listed below. Please upgrade your version to the appropriate version.

Affected products

The information is organized under the following headings:

(Example)
Product name: Gives the name of the affected product.

Version:

Platform
Gives the affected version.

Product name: JP1/File Transmission Server/FTP

Version(s):

HP-UX(IPF)
10-00 to 10-00-05, 10-10 to 10-10-01
AIX
10-00 to 10-00-05, 10-10 to 10-10-02
Solaris
10-00 to 10-00-05, 10-10 to 10-10-01
Linux
10-00 to 10-00-05, 10-10 to 10-10-02
HP-UX(IPF)(Multi-language version)
10-00-02 to 10-00-05, 10-10-01
AIX(Multi-language version)
10-00-02 to 10-00-05, 10-10-02
Solaris(Multi-language version)
10-00-02 to 10-00-05, 10-10-01
Linux(Multi-language version)
10-10-02

Fixed products

The information is organized under the following headings:

(Example)
Product name: Gives the name of the fixed product.

Version:

Platform
Gives the fixed version, and release date.

Scheduled version:

Platform
Gives the fixed version scheduled to be released.

Product name: JP1/File Transmission Server/FTP

Version(s)(*1):

HP-UX(IPF)
10-10-03 March 3, 2014
AIX
10-10-03 March 3, 2014
Solaris
10-10-03 March 3, 2014
Linux
10-10-03 March 3, 2014

Scheduled version(s):

HP-UX(IPF)(Multi-language version)
10-10-03
AIX(Multi-language version)
10-10-03
Solaris(Multi-language version)
10-10-03
Linux(Multi-language version)
10-10-03

For details on the fixed products, contact your Hitachi support service representative.

*1
Before applying the fixed version, upgrading might be necessary.

Revision history

March 7, 2014
This page is released.
  • Hitachi, Ltd. (hereinafter referred to as "Hitachi") tries to provide accurate information about security countermeasures. However, since information about security problems constantly changes, the contents of these Web pages are subject to change without prior notice. When referencing information, please confirm that you are referencing the latest information.
  • The Web pages include information about products that are developed by non-Hitachi software developers. Vulnerability information about those products is based on the information provided or disclosed by those developers. Although Hitachi is careful about the accuracy and completeness of this information, the contents of the Web pages may change depending on the changes made by the developers.
  • The Web pages are intended to provide vulnerability information only, and Hitachi shall not have any legal responsibility for the information contained in them. Hitachi shall not be liable for any consequences arising out of or in connection with the security countermeasures or other actions that you will take or have taken (or not taken) by yourself.
  • The links to other web sites are valid at the time of the release of the page. Although Hitachi makes an effort to maintain the links, Hitachi cannot guarantee their permanent availability.