Skip to main content

Hitachi
Contact UsContact Us

Update: February 23, 2007

Multiple vulnerabilities were found in JP1/Cm2/Network Node Manager(NNM). Malicious remote attackers can exploit these vulnerabilities, cause DoS (Denial of Service), and execute arbitrary code.

Vulnerability ID

HS07-002

Vulnerability description

The following vulnerabilities were found in JP1/Cm2/Network Node Manager:

  • DoS and arbitrary code execution.
  • Invalid behavior of the Web utility function.

Affected products and versions are listed below. Please upgrade your version to the appropriate version, or apply the Workarounds.

Affected products

The information is organized under the following headings:

(Example)
Product name: Gives the name of the affected product.

Version:

Platform
Gives the affected version.

Product name: Cm2/Network Node Manager Enterprise

Version(s):

HP-UX
05-00 to 05-00-/C
HI-UX/WE2
05-00

Product name: Cm2/Network Node Manager Unlimited

Version(s):

Windows
05-00 to 05-00-/A

Product name: Cm2/Network Node Manager 250

Version(s):

HP-UX
05-00 to 05-00-/C
Windows
05-00 to 05-00-/A
HI-UX/WE2
05-00

Product name: JP1/Cm2/Network Node Manager Enterprise

Version(s):

HP-UX
05-20 to 05-20-/E, 06-00 to 06-50-/A,
06-51 to 06-71-/C
Windows
05-20 to 05-20-/F, 06-00 to 06-50-/A,
06-51 to 06-71-/D
Solaris
05-20 to 05-20-/E, 06-00 to 06-50-/A,
06-51 to 06-71-/C

Product name: JP1/Cm2/Network Node Manager 250

Version(s):

HP-UX
05-20 to 05-20-/E, 06-00 to 06-50-/A,
06-51 to 06-71-/C
Windows
05-20 to 05-20-/F, 06-00 to 06-50-/A,
06-51 to 06-71-/D
Solaris
05-20 to 05-20-/E, 06-00 to 06-50-/A,
06-51 to 06-71-/C

Product name: JP1/Cm2/Network Node Manager

Version(s):

HP-UX
07-00 to 07-10-04
Windows
07-00 to 07-10-04
Solaris
07-00 to 07-10-04

Product name: JP1/Cm2/Network Node Manager Starter Edition Enterprise

Version(s):

HP-UX(PA-RISC)
08-00 to 08-00-01
HP-UX(IPF)
08-00 to 08-00-01
Windows
08-00 to 08-00-01
Solaris
08-00 to 08-00-01

Product name: JP1/Cm2/Network Node Manager Starter Edition 250

Version(s):

HP-UX(PA-RISC)
08-00 to 08-00-01
HP-UX(IPF)
08-00 to 08-00-01
Windows
08-00 to 08-00-01
Solaris
08-00 to 08-00-01

Fixed products

The information is organized under the following headings:

(Example)
Product name: Gives the name of the fixed product.

Version:

Platform
Gives the fixed version, and release date.

Scheduled version:

Platform
Gives the fixed version scheduled to be released.

Product name: JP1/Cm2/Network Node Manager

Version(s)(*1):

HP-UX
07-10-05 December 28, 2006
Windows
07-10-05 December 28, 2006
Solaris
07-10-05 December 28, 2006

Product name: JP1/Cm2/Network Node Manager Starter Edition Enterprise

Version(s)(*1):

HP-UX(PA-RISC)
08-00-02 September 30, 2006
HP-UX(IPF)
08-00-02 September 30, 2006
Windows
08-00-02 September 30, 2006
Solaris
08-00-02 September 30, 2006

Product name: JP1/Cm2/Network Node Manager Starter Edition 250

Version(s)(*1):

HP-UX(PA-RISC)
08-00-02 September 30, 2006
HP-UX(IPF)
08-00-02 September 30, 2006
Windows
08-00-02 September 30, 2006
Solaris
08-00-02 September 30, 2006

For details on the fixed products, contact your Hitachi support service representative.

Workarounds

Please carry out the following workaround until the fixed modules are available:

  • Set filtering rules on the OS or router so that only reliable IP addresses can access the ports that NNM uses.
*1
Products that operate while linked to NNM might also have to be upgraded. For the appropriate version of such linked products, refer to the applicable documentation for that product (such as documentation or Readme files provided with the software).

Revision history

February 23, 2007
This page is released.
  • Hitachi, Ltd. (hereinafter referred to as "Hitachi") tries to provide accurate information about security countermeasures. However, since information about security problems constantly changes, the contents of these Web pages are subject to change without prior notice. When referencing information, please confirm that you are referencing the latest information.
  • The Web pages include information about products that are developed by non-Hitachi software developers. Vulnerability information about those products is based on the information provided or disclosed by those developers. Although Hitachi is careful about the accuracy and completeness of this information, the contents of the Web pages may change depending on the changes made by the developers.
  • The Web pages are intended to provide vulnerability information only, and Hitachi shall not have any legal responsibility for the information contained in them. Hitachi shall not be liable for any consequences arising out of or in connection with the security countermeasures or other actions that you will take or have taken (or not taken) by yourself.
  • The links to other web sites are valid at the time of the release of the page. Although Hitachi makes an effort to maintain the links, Hitachi cannot guarantee their permanent availability.