Skip to main content

Hitachi
Contact UsContact Us

Update: May 23, 2008

A vulnerability to Denial of Service (DoS) attacks was found in JP1/Cm2/Network Node Manager(abbreviated hereafter to NNM). This problem could result in the stopping of NNM services.

Vulnerability ID

HS08-006

Vulnerability description

A vulnerability to DoS attacks was found in NNM. Malicious remote users might exploit this vulnerability to disrupt services. Affected products and versions are listed below. Please upgrade to the appropriate version, or apply the Workaround.

Affected products

The information is organized under the following headings:

(Example)
Product name: Gives the name of the affected product.

Version:

Platform
Gives the affected version.

Product name: Comet/MGR

Version(s):

HI-UX/WE2(*1)
01-00, 02-00 to 02-00-/B, 02-01 to 02-01-/A, 03-00, 03-01 to 03-01-/A, 03-02 to 03-02-/E

Product name: Cm2/Network Node Manager

Version(s):

Windows
01-00 to 01-00-/G, 02-00 to 02-00-/G, 03-00 to 03-00-/G
HI-UX/WE2(*1)
01-00, 04-02 to 04-02-/B, 04-03 to 04-03-/J
HP-UX
04-03 to 04-03-/G
Solaris
04-03 to 04-03-/A

Product name: Cm2/Network Node Manager Enterprise

Version(s):

HI-UX/WE2(*1)
05-00
HP-UX
05-00 to 05-00-/C

Product name: Cm2/Network Node Manager Unlimited

Version(s):

Windows
05-00 to 05-00-/A

Product name: Cm2/Network Node Manager 250

Version(s):

HI-UX/WE2(*1)
05-00
HP-UX
05-00 to 05-00-/C
Windows
05-00 to 05-00-/A

Product name: JP1/Cm2/Network Node Manager Enterprise

Version(s):

HP-UX
05-20 to 05-20-/E, 06-00 to 06-00-/A, 06-50 to 06-50-/A, 06-51 to 06-51-/A, 06-71 to 06-71-/D
Solaris
05-20 to 05-20-/E, 06-00 to 06-00-/C, 06-50 to 06-50-/A, 06-51 to 06-51-/B, 06-71 to 06-71-/D
Windows
05-20 to 05-20-/F, 06-00 to 06-00-/B, 06-50 to 06-50-/A, 06-51 to 06-51-/B, 06-71 to 06-71-/E

Product name: JP1/Cm2/Network Node Manager 250

Version(s):

HP-UX
05-20 to 05-20-/E, 06-00 to 06-00-/A, 06-50 to 06-50-/A, 06-51 to 06-51-/A, 06-71 to 06-71-/D
Solaris
05-20 to 05-20-/E, 06-00 to 06-00-/C, 06-50 to 06-50-/A, 06-51 to 06-51-/B, 06-71 to 06-71-/D
Windows
05-20 to 05-20-/F, 06-00 to 06-00-/B, 06-50 to 06-50-/A, 06-51 to 06-51-/B, 06-71 to 06-71-/E

Product name: JP1/Cm2/Network Node Manager

Version(s):

HP-UX
07-00 to 07-00-/A, 07-01 to 07-01-/B, 07-10 to 07-10-05
Solaris
07-00 to 07-00-/A, 07-01 to 07-01-/B, 07-10 to 07-10-05
Windows
07-00 to 07-00-/A, 07-01 to 07-01-/B, 07-10 to 07-10-05

Product name: JP1/Cm2/Network Node Manager Starter Edition Enterprise

Version(s):

HP-UX(PA-RISC)
08-00 to 08-00-03, 08-10
HP-UX(IPF)
08-00 to 08-00-03, 08-10
Solaris
08-00 to 08-00-03, 08-10
Windows
08-00 to 08-00-03, 08-10

Product name: JP1/Cm2/Network Node Manager Starter Edition 250

Version(s):

HP-UX(PA-RISC)
08-00 to 08-00-03, 08-10
HP-UX(IPF)
08-00 to 08-00-03, 08-10
Solaris
08-00 to 08-00-03, 08-10
Windows
08-00 to 08-00-03, 08-10
*1
For details about this version, contact your Hitachi support service representative.

Fixed products

The information is organized under the following headings:

(Example)
Product name: Gives the name of the fixed product.

Version:

Platform
Gives the fixed version, and release date.

Scheduled version(s):

Platform
Gives the fixed version scheduled to be released.

Product name: JP1/Cm2/Network Node Manager

Version(s)(*2):

HP-UX
07-10-06 November 12, 2007
Solaris
07-10-06 November 12, 2007
Windows
07-10-06 November 12, 2007

Product name: JP1/Cm2/Network Node Manager Starter Edition Enterprise

Version(s)(*2):

HP-UX(PA-RISC)
08-10-01 March 25, 2008
HP-UX(IPF)
08-10-01 March 25, 2008
Solaris
08-10-01 March 25, 2008
Windows
08-10-01 March 25, 2008

Product name: JP1/Cm2/Network Node Manager Starter Edition 250

Version(s)(*2):

HP-UX(PA-RISC)
08-10-01 March 25, 2008
HP-UX(IPF)
08-10-01 March 25, 2008
Solaris
08-10-01 March 25, 2008
Windows
08-10-01 March 25, 2008

For details on the fixed products, contact your Hitachi support service representative.

*2
You might also have to upgrade products that operate while linked to NNM. For the appropriate versions of such linked products and product notifications, refer to the appropriate product documentation, including the Readme files or Release Notes provided with the software.

Workarounds

Perform the following workaround until a fixed module is available:

  1. Set filtering rules in the OS or router so that only reliable hosts can access the TCP ports used by NNM.

Revision history

May 23, 2008
This page is released.
  • Hitachi, Ltd. (hereinafter referred to as "Hitachi") tries to provide accurate information about security countermeasures. However, since information about security problems constantly changes, the contents of these Web pages are subject to change without prior notice. When referencing information, please confirm that you are referencing the latest information.
  • The Web pages include information about products that are developed by non-Hitachi software developers. Vulnerability information about those products is based on the information provided or disclosed by those developers. Although Hitachi is careful about the accuracy and completeness of this information, the contents of the Web pages may change depending on the changes made by the developers.
  • The Web pages are intended to provide vulnerability information only, and Hitachi shall not have any legal responsibility for the information contained in them. Hitachi shall not be liable for any consequences arising out of or in connection with the security countermeasures or other actions that you will take or have taken (or not taken) by yourself.
  • The links to other web sites are valid at the time of the release of the page. Although Hitachi makes an effort to maintain the links, Hitachi cannot guarantee their permanent availability.