Skip to main content

Hitachi
Contact UsContact Us

Update: October 17, 2008

A vulnerability to Denial of Service (DoS) attacks exists in JP1/NETM/DM SubManager and JP1/NETM/DM Client. If this problem occurs, job execution requests from a higher-level system might not be received.

Vulnerability ID

HS08-019

Vulnerability description

In JP1/NETM/DM SubManager and JP1/NETM/DM Client, in an environment that is set to report JP1 events (JP1 Event AutoAction), if an error occurs during processing to receive job execution requests, it might be because the JP1 process has stopped. As a result, job execution requests might not be received from a higher-level system.

However, in an environment in which the higher-level systems are polled regularly, the polling functionality might execute the job even if the JP1 process has stopped.

Affected products and versions are listed below. Please upgrade to the appropriate version, or use the Workaround.

Affected products

The information is organized under the following headings:

(Example)
Product name: Gives the name of the affected product.

Version:

Platform
Gives the affected version.

Product name: JP1/NETM/DM SubManager

Version(s):

Linux(x86)
08-00 to 08-00-03, 08-10 to 08-10-01

Product name: JP1/NETM/DM Client

Version(s):

Linux(x86)
08-00 to 08-00-03, 08-10 to 08-10-02

Fixed products

The information is organized under the following headings:

(Example)
Product name: Gives the name of the fixed product.

Version:

Platform
Gives the fixed version, and release date.

Scheduled version(s):

Platform
Gives the fixed version scheduled to be released.

Product name: JP1/NETM/DM SubManager

Version(s):

Linux(x86)
08-00-04 July 31, 2008
08-10-03 April 28, 2008

Product name: JP1/NETM/DM Client

Version(s):

Linux(x86)
08-00-04 June 30, 2008
08-10-03 April 28, 2008

For details on the fixed products, contact your Hitachi support service representative.

Workarounds

Please use the following workaround until a patched module is available:

  1. Set [AutoAction] to [NO] in the JP1/NETM/DM SubManager file and the JP1/NETM/DM Client setting file.

Revision history

October 17, 2008
This page is released.
  • Hitachi, Ltd. (hereinafter referred to as "Hitachi") tries to provide accurate information about security countermeasures. However, since information about security problems constantly changes, the contents of these Web pages are subject to change without prior notice. When referencing information, please confirm that you are referencing the latest information.
  • The Web pages include information about products that are developed by non-Hitachi software developers. Vulnerability information about those products is based on the information provided or disclosed by those developers. Although Hitachi is careful about the accuracy and completeness of this information, the contents of the Web pages may change depending on the changes made by the developers.
  • The Web pages are intended to provide vulnerability information only, and Hitachi shall not have any legal responsibility for the information contained in them. Hitachi shall not be liable for any consequences arising out of or in connection with the security countermeasures or other actions that you will take or have taken (or not taken) by yourself.
  • The links to other web sites are valid at the time of the release of the page. Although Hitachi makes an effort to maintain the links, Hitachi cannot guarantee their permanent availability.