Skip to main content

Hitachi
Contact UsContact Us

Update: April 6, 2007

In JP1/HiCommand series products, user authentication information might be exposed. Note that JP1/HiCommand series products are for Japanese systems only. JP1 is an abbreviation for Job Management Partner 1.

Vulnerability ID

HS07-007

Vulnerability description

An authentication information exposure vulnerability was found in the following JP1/HiCommnand series products:

  • JP1/HiCommand Device Manager
  • JP1/HiCommand Global Link Availability Manager
  • JP1/HiCommand Replication Monitor
  • JP1/HiCommand Tiered Storage Manager
  • JP1/HiCommand Tuning Manager

This vulnerability might cause local users to gain access to authentication information of other users.

Affected products and versions are listed below. Please upgrade your version to the appropriate version.

Affected products

The information is organized under the following headings:

(Example)
Product name: Gives the name of the affected product.

Version:

Platform
Gives the affected version.

Product name: JP1/HiCommand Device Manager

Version(s):

Windows
05-00 to 05-10-05, 05-50 to 05-50-02,
05-60
Solaris
05-00 to 05-10-05, 05-50 to 05-50-02,
05-60
Linux
05-10 to 05-10-05, 05-50 to 05-50-02,
05-60

Product name: JP1/HiCommand Global Link Availability Manager

Version(s):

Windows
05-00 to 05-60

Product name: JP1/HiCommand Replication Monitor

Version(s):

Windows
04-00 to 05-50-02, 05-60
Solaris
04-00 to 05-50-02, 05-60

Product name: JP1/HiCommand Tiered Storage Manager

Version(s):

Windows
04-00 to 05-50-01
Solaris
04-00 to 05-50-01

Product name: JP1/HiCommand Tuning Manager

Version(s):

Windows
04-00 to 05-50
Solaris
04-00 to 05-50

Fixed products

The information is organized under the following headings:

(Example)
Product name: Gives the name of the fixed product.

Version:

Platform
Gives the fixed version, and release date.

Scheduled version:

Platform
Gives the fixed version scheduled to be released.

Product name: JP1/HiCommand Device Manager

Version(s) (*1):

Windows
05-10-07 March 15, 2007
05-50-03 February 28, 2007
05-60-01 February 28, 2007
Solaris
05-10-07 March 15, 2007
05-50-03 February 28, 2007
05-60-01 February 28, 2007
Linux
05-10-07 March 15, 2007
05-50-03 February 28, 2007
05-60-01 February 28, 2007

Product name: JP1/HiCommand Global Link Availability Manager

Version(s)(*1):

Windows
05-60-01 February 28, 2007

Product name: JP1/HiCommand Replication Monitor

Version(s)(*1)(*2):

Windows
05-50-03 February 28, 2007
05-60-01 February 28, 2007
Solaris
05-50-03 February 28, 2007
05-60-01 February 28, 2007

Product name: JP1/HiCommand Tiered Storage Manager

Version(s)(*1)(*2):

Windows
05-50-02 February 28, 2007
Solaris
05-50-02 February 28, 2007

Product name: JP1/HiCommand Tuning Manager

Version(s)(*1)(*3):

Windows
05-50-03 March 30, 2007
Solaris
05-50-03 March 30, 2007

For details on the fixed products, contact your Hitachi support service representative.

*1
Before applying the fixed version, upgrading might be necessary.
*2
JP1/HiCommand Device Manager must also be upgraded if it operates while linked to these products.
*3
Upgrading of JP1/PFM - Manager Web Option might be necessary.

Revision history

April 6, 2007
Information about fixed products of JP1/HiCommand Device Manager and JP1/HiCommand Tuning Manager is updated.
March 30, 2007
This page is released.
  • Hitachi, Ltd. (hereinafter referred to as "Hitachi") tries to provide accurate information about security countermeasures. However, since information about security problems constantly changes, the contents of these Web pages are subject to change without prior notice. When referencing information, please confirm that you are referencing the latest information.
  • The Web pages include information about products that are developed by non-Hitachi software developers. Vulnerability information about those products is based on the information provided or disclosed by those developers. Although Hitachi is careful about the accuracy and completeness of this information, the contents of the Web pages may change depending on the changes made by the developers.
  • The Web pages are intended to provide vulnerability information only, and Hitachi shall not have any legal responsibility for the information contained in them. Hitachi shall not be liable for any consequences arising out of or in connection with the security countermeasures or other actions that you will take or have taken (or not taken) by yourself.
  • The links to other web sites are valid at the time of the release of the page. Although Hitachi makes an effort to maintain the links, Hitachi cannot guarantee their permanent availability.