Skip to main content

Hitachi
Contact UsContact Us

Update: October 1, 2021

A vulnerability to denial-of-service attacks (CVE-2011-4858) was found in Cosminexus.

Vulnerability ID

HS12-003

Vulnerability description

When an affected Cosminexus receives a HTTP request, containing a lot of parameters that would have the same hash value, a DoS might occur.

Affected products and versions are listed below. Please upgrade your version to the appropriate version, or apply the Workarounds.

Affected products

The information is organized under the following headings:

(Example)
Product name: Gives the name of the affected product.

Version:

Platform
Gives the affected version.

- Cosminexus V7, V8

Product name: uCosminexus Application Server Enterprise
Product name: uCosminexus Application Server Express
Product name: uCosminexus Application Server Light
Product name: uCosminexus Application Server Smart Edition
Product name: uCosminexus Application Server Standard
Product name: uCosminexus Application Server Standard-R
Product name: uCosminexus Developer 01
Product name: uCosminexus Developer Light
Product name: uCosminexus Developer Professional
Product name: uCosminexus Developer Professional for Plug-in
Product name: uCosminexus Developer Standard
Product name: uCosminexus Primary Server Base
Product name: uCosminexus Service Architect
Product name: uCosminexus Service Platform
Product name: uCosminexus Service Platform - Messaging

Version(s):

Windows
07-00 to 08-70
Windows(x64)
08-50 to 08-70
Linux
07-00 to 08-70
Linux(IPF)
07-10 to 08-50
AIX
07-00 to 08-70
HP-UX
07-10
HP-UX(IPF)
07-00 to 08-70
Solaris(SPARC)
07-00 to 08-00
Solaris(x64)
08-20

- Cosminexus V6.7

Product name: uCosminexus Application Server Enterprise
Product name: uCosminexus Application Server Standard
Product name: uCosminexus Developer Standard
Product name: uCosminexus Developer Professional
Product name: uCosminexus Developer Light

Version(s):

Windows
06-70 to 06-70-/F, 06-71 to 06-71-/L
Windows(IPF)
06-70 to 06-70-/A
Linux
06-70 to 06-70-/F, 06-71 to 06-71-/I
Linux(IPF)
06-70 to 06-70-/I
AIX
06-70 to 06-70-/Q
HP-UX
06-70 to 06-70-/E, 06-72 to 06-72-/D
HP-UX(IPF)
06-70 to 06-70-/P
Solaris
06-70 to 06-70-/F

- Cosminexus V6

Product name: Cosminexus Application Server Enterprise Version 6
Product name: Cosminexus Application Server Standard Version 6
Product name: Cosminexus Developer Standard Version 6
Product name: Cosminexus Developer Professional Version 6
Product name: Cosminexus Developer Light Version 6
Product name: Cosminexus Primary Server Base

Version(s):

Windows
06-00 to 06-00-/I, 06-02 to 06-02-/G, 06-50 to 06-50-/F, 06-51 to 06-51-/M
Linux
06-00 to 06-00-/E, 06-02 to 06-02-/F, 06-50 to 06-50-/C, 06-51 to 06-51-/E
Linux(IPF)
06-00 to 06-00-/B, 06-02 to 06-02-/D, 06-50 to 06-50-/B, 06-51 to 06-51-/B
AIX
06-00 to 06-00-/I, 06-50 to 06-50-/I
HP-UX
06-00 to 06-00-/E, 06-50 to 06-50-/F
HP-UX(IPF)
06-00 to 06-00-/E, 06-50 to 06-50-/E
Solaris
06-00 - 06-00-/A, 06-50 - 06-50-/C

- Cosminexus V5

Product name: Cosminexus Application Server Version 5
Product name: Cosminexus Developer Version 5
Product name: Cosminexus Studio Version 5

Version(s):

Windows
05-00 to 05-00-/I, 05-01 to 05-01-/L, 05-05 to 05-05-/R
Linux
05-05 to 05-05-/I
AIX
05-00 to 05-00-/S, 05-05 to 05-05-/O
HP-UX
05-02 to 05-02-/E, 05-05 to 05-05-/I

Fixed products

The information is organized under the following headings:

(Example)
Product name: Gives the name of the fixed product.

Version:

Platform
Gives the fixed version, and release date.

Scheduled version:

Platform
Gives the fixed version scheduled to be released.

Product name: Cosminexus Component Container

Version(s):

Windows
08-70-03 March 19, 2012
08-53-05 March 20, 2012
08-50-19 May 21, 2012
08-00-23 August 7, 2012
07-60-24 May 26, 2016
Windows(x64)
08-70-03 March 19, 2012
08-53-05 March 20, 2012
08-50-19 May 21, 2012
Linux
08-70-03 March 16, 2012
08-53-05 March 30, 2012
Linux(x64)
08-70-03 March 19, 2012
08-53-05 March 30, 2012
08-50-19 May 7, 2012
08-20-06 January 13, 2015
08-00-23 August 7, 2012
07-60-24 May 26, 2016
AIX
08-70-03 March 19, 2012
08-50-19 May 14, 2012
08-00-23 August 7, 2012
07-60-24 May 26, 2016
07-50-14 May 17, 2012
HP-UX
07-10-24 April 13, 2012
HP-UX(IPF)
08-70-03 February 28, 2012
08-50-21 November 12, 2012
08-00-25 June 25, 2013
07-60-24 May 26, 2016
Solaris(SPARC)
08-00-24 December 6, 2012
07-60-24 May 26, 2016
Solaris(x64)
08-20-05 July 19, 2012

For details on the fixed products, contact your Hitachi support service representative.

Workarounds

For details about the workarounds, contact your Hitachi support service representative.

Revision history

October 1, 2021
Information about affected products and fixed products are updated.
August 8, 2012
Information about fixed products is updated.
June 4, 2012
Information about fixed products is updated.
April 20, 2012
Information about fixed products is updated.
January 20, 2012
This page is released.
  • Hitachi, Ltd. (hereinafter referred to as "Hitachi") tries to provide accurate information about security countermeasures. However, since information about security problems constantly changes, the contents of these Web pages are subject to change without prior notice. When referencing information, please confirm that you are referencing the latest information.
  • The Web pages include information about products that are developed by non-Hitachi software developers. Vulnerability information about those products is based on the information provided or disclosed by those developers. Although Hitachi is careful about the accuracy and completeness of this information, the contents of the Web pages may change depending on the changes made by the developers.
  • The Web pages are intended to provide vulnerability information only, and Hitachi shall not have any legal responsibility for the information contained in them. Hitachi shall not be liable for any consequences arising out of or in connection with the security countermeasures or other actions that you will take or have taken (or not taken) by yourself.
  • The links to other web sites are valid at the time of the release of the page. Although Hitachi makes an effort to maintain the links, Hitachi cannot guarantee their permanent availability.