ID

VAR-200604-0570


CVE

CVE-2006-2068


TITLE

Hitachi JP1 Denial of Service Vulnerability

Trust: 1.2

sources: CNVD: CNVD-2006-2723 // CNNVD: CNNVD-200604-529

DESCRIPTION

Unspecified vulnerability in Hitachi JP1 products allow remote attackers to cause a denial of service (application stop or fail) via unexpected requests or data. Unknown vulnerability in Hitachi JP1 product. Multiple JP1 products are prone to a denial-of-service vulnerability. This issue affects multiple models and versions of Hitachi JP1 products. Specific models and versions will be listed in future revisions of this BID. TITLE: Hitachi Multiple JP1 Products Denial of Service SECUNIA ADVISORY ID: SA19841 VERIFY ADVISORY: http://secunia.com/advisories/19841/ CRITICAL: Moderately critical IMPACT: DoS WHERE: >From remote SOFTWARE: Hitachi JP1/Server Conductor/Server Manager http://secunia.com/product/9572/ Hitachi JP1/Server Conductor/Blade Server Manager http://secunia.com/product/9571/ Hitachi JP1/Security Integrated Manager http://secunia.com/product/9574/ Hitachi JP1/PFM/SNMP System Observer (SSO) http://secunia.com/product/9566/ Hitachi JP1/Performance Management (PFM) http://secunia.com/product/9568/ Hitachi JP1/File Access Control http://secunia.com/product/9573/ Hitachi JP1/Cm2/Network Node Manager http://secunia.com/product/9570/ Hitachi JP1/Automatic Job Management System 2 (AJS2) http://secunia.com/product/9567/ DESCRIPTION: A vulnerability has been reported in multiple JP1 products, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an error when handling certain specially crafted data or requests. This can be exploited to cause the products to stop responding. The vulnerability has been reported in the following products: * JP1/PFM/SNMP System Observer * JP1/Server System Observer * JP1/Automatic Job Management System 2 * JP1/Performance Management * Cm2/Network Node Manager Enterprise/Unlimited/250, * JP1/Cm2/Network Node Manager Enterprise/250 * JP1/Server Conductor/Blade Server Manager * JP1/Server Conductor/Server Manager * Server Conductor/Blade Server Manager * Server Conductor/Server Manager * System Manager - Management Console * JP1/File Access Control * JP1/Security Integrated Manager SOLUTION: Apply patches (see patch matrix in the vendor advisory). PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://www.hitachi-support.com/security_e/vuls_e/HS06-007_e/index-e.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.52

sources: NVD: CVE-2006-2068 // JVNDB: JVNDB-2006-000983 // CNVD: CNVD-2006-2723 // BID: 17706 // PACKETSTORM: 45732

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2006-2723

AFFECTED PRODUCTS

vendor:hitachimodel:jp1-cm2-network node manager 250scope:eqversion:06_00

Trust: 1.6

vendor:hitachimodel:jp1-cm2-network node manager 250scope:eqversion:05_20

Trust: 1.6

vendor:hitachimodel:jp1/cm2/operations assist submanagerscope:eqversion:07-50

Trust: 1.2

vendor:hitachimodel:jp1/cm2/operations assist submanagerscope:eqversion:07-10

Trust: 1.2

vendor:hitachimodel:jp1/cm2/operations assist submanagerscope:eqversion:07-00

Trust: 1.2

vendor:hitachimodel:jp1/cm2/operations assist submanagerscope:neversion:07-50-01

Trust: 1.2

vendor:hitachimodel:jpi pfm snmp system observerscope:eqversion:*

Trust: 1.0

vendor:hitachimodel:jpi security integrated managerscope:eqversion:*

Trust: 1.0

vendor:hitachimodel:jpi server conductor blade server managerscope:eqversion:*

Trust: 1.0

vendor:hitachimodel:jpi automatic job management system 2scope:eqversion:*

Trust: 1.0

vendor:hitachimodel:jpi server system observer - report featurescope:eqversion:*

Trust: 1.0

vendor:hitachimodel:jpi performance managementscope:eqversion:*

Trust: 1.0

vendor:hitachimodel:jp1-cm2-network node managerscope:lteversion:05_20

Trust: 1.0

vendor:hitachimodel:jpi server conductor server managerscope:eqversion:*

Trust: 1.0

vendor:hitachimodel:jp1/cm2/operations assist submanagerscope:eqversion:06-71

Trust: 0.9

vendor:hitachimodel:jp1/cm2/operations assist submanagerscope:eqversion:06-00

Trust: 0.9

vendor:hitachimodel:jp1/cm2/operations assist managerscope:eqversion:07-50-02

Trust: 0.9

vendor:hitachimodel:jp1/cm2/operations assist managerscope:eqversion:07-50

Trust: 0.9

vendor:hitachimodel:jp1/cm2/operations assist managerscope:eqversion:07-11

Trust: 0.9

vendor:hitachimodel:jp1/cm2/operations assist managerscope:eqversion:07-10

Trust: 0.9

vendor:hitachimodel:jp1/cm2/operations assist managerscope:eqversion:07-00

Trust: 0.9

vendor:hitachimodel:jp1/cm2/operations assist managerscope:eqversion:06-71

Trust: 0.9

vendor:hitachimodel:jp1/cm2/operations assist managerscope:eqversion:06-50

Trust: 0.9

vendor:hitachimodel:jp1/cm2/operations assist managerscope:eqversion:06-00

Trust: 0.9

vendor:hitachimodel:jp1/cm2/operations assist managerscope:neversion:07-50-03

Trust: 0.9

vendor:hitachimodel:cm2/network node managerscope:eqversion:250

Trust: 0.8

vendor:hitachimodel:cm2/network node managerscope:eqversion:enterprise

Trust: 0.8

vendor:hitachimodel:cm2/network node managerscope:eqversion:unlimited

Trust: 0.8

vendor:hitachimodel:job management partner 1/automatic job management system 2scope:eqversion:agent

Trust: 0.8

vendor:hitachimodel:job management partner 1/automatic job management system 2scope:eqversion:manager

Trust: 0.8

vendor:hitachimodel:job management partner 1/basescope: - version: -

Trust: 0.8

vendor:hitachimodel:jp1/automatic job management system 2scope:eqversion:agent

Trust: 0.8

vendor:hitachimodel:jp1/automatic job management system 2scope:eqversion:light edition

Trust: 0.8

vendor:hitachimodel:jp1/automatic job management system 2scope:eqversion:manager

Trust: 0.8

vendor:hitachimodel:jp1/basescope: - version: -

Trust: 0.8

vendor:hitachimodel:jp1/cm2/extensible agentscope: - version: -

Trust: 0.8

vendor:hitachimodel:jp1/cm2/hierarchical agentscope: - version: -

Trust: 0.8

vendor:hitachimodel:jp1/cm2/network node managerscope: - version: -

Trust: 0.8

vendor:hitachimodel:jp1/cm2/network node managerscope:eqversion:250

Trust: 0.8

vendor:hitachimodel:jp1/cm2/network node managerscope:eqversion:enterprise

Trust: 0.8

vendor:hitachimodel:jp1/cm2/operations assistscope:eqversion:agent

Trust: 0.8

vendor:hitachimodel:jp1/cm2/operations assistscope:eqversion:manager

Trust: 0.8

vendor:hitachimodel:jp1/cm2/operations assistscope:eqversion:submanager

Trust: 0.8

vendor:hitachimodel:jp1/cm2/submanagerscope: - version: -

Trust: 0.8

vendor:hitachimodel:jp1/file access controlscope: - version: -

Trust: 0.8

vendor:hitachimodel:jp1/performance managementscope:eqversion:agent

Trust: 0.8

vendor:hitachimodel:jp1/performance managementscope:eqversion:manager

Trust: 0.8

vendor:hitachimodel:jp1/performance managementscope:eqversion:view

Trust: 0.8

vendor:hitachimodel:jp1/pfm/snmp system observerscope:eqversion:report feature

Trust: 0.8

vendor:hitachimodel:jp1/security integrated managerscope: - version: -

Trust: 0.8

vendor:hitachimodel:jp1/security integrated managerscope:eqversion:runtime library

Trust: 0.8

vendor:hitachimodel:jp1/server system observerscope:eqversion:report feature

Trust: 0.8

vendor:hitachimodel:jp1/serverconductor/blade server managerscope: - version: -

Trust: 0.8

vendor:hitachimodel:jp1/serverconductor/deployment managerscope:eqversion:enterprise edition

Trust: 0.8

vendor:hitachimodel:jp1/serverconductor/deployment managerscope:eqversion:standard edition

Trust: 0.8

vendor:hitachimodel:jp1/serverconductor/server managerscope: - version: -

Trust: 0.8

vendor:hitachimodel:serverconductor/blade server managerscope: - version: -

Trust: 0.8

vendor:hitachimodel:serverconductor/deployment managerscope: - version: -

Trust: 0.8

vendor:hitachimodel:serverconductor/server managerscope: - version: -

Trust: 0.8

vendor:hitachimodel:system managerscope:eqversion:management console

Trust: 0.8

vendor:jp1 cm2 networkmodel:node manager hitachi 05 20scope:eqversion:250

Trust: 0.6

vendor:jp1 cm2 networkmodel:node manager hitachi 06 00scope:eqversion:250

Trust: 0.6

vendor:hitachimodel:jp1/cm2/operations assist submanagerscope:eqversion:06-50

Trust: 0.6

vendor:hitachimodel:jp1/cm2/operations assist submanager 06-00-/ascope: - version: -

Trust: 0.6

vendor:hitachimodel:jp1/cm2/operations assist submanagerscope:eqversion:05-20(*1)

Trust: 0.6

vendor:hitachimodel:jp1/cm2/operations assist submanagerscope:eqversion:05-00(*1)

Trust: 0.6

vendor:hitachimodel:jp1/cm2/operations assist manager 07-00-/bscope: - version: -

Trust: 0.6

vendor:hitachimodel:jp1/cm2/operations assist manager 06-00-/bscope: - version: -

Trust: 0.6

vendor:hitachimodel:jp1/cm2/operations assist managerscope:eqversion:05-20

Trust: 0.6

vendor:hitachimodel:jp1/cm2/operations assist submanager 06-71-/ascope:neversion: -

Trust: 0.6

vendor:hitachimodel:jpi pfm snmp system observerscope: - version: -

Trust: 0.6

vendor:hitachimodel:jpi security integrated managerscope: - version: -

Trust: 0.6

vendor:hitachimodel:jpi server conductor server managerscope: - version: -

Trust: 0.6

vendor:hitachimodel:jpi automatic job management system 2scope:eqversion:agent

Trust: 0.6

vendor:hitachimodel:jpi automatic job management system 2scope: - version: -

Trust: 0.6

vendor:hitachimodel:jp1-cm2-network node managerscope:eqversion:05_20

Trust: 0.6

vendor:hitachimodel:jpi performance managementscope: - version: -

Trust: 0.6

vendor:hitachimodel:jpi server system observer - report featurescope: - version: -

Trust: 0.6

vendor:hitachimodel:system manager management consolescope:eqversion:-0

Trust: 0.3

vendor:hitachimodel:server conductor/server managerscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:server conductor/blade server managerscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:jp1/server conductor/server managerscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:jp1/server conductor/blade server managerscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:jp1/security integrated manager runtime libraryscope:eqversion:-0

Trust: 0.3

vendor:hitachimodel:jp1/security integrated managerscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:jp1/pfm/snmp system observer report featurescope:eqversion:-0

Trust: 0.3

vendor:hitachimodel:jp1/performance management viewscope:eqversion:-0

Trust: 0.3

vendor:hitachimodel:jp1/performance management managerscope:eqversion:-0

Trust: 0.3

vendor:hitachimodel:jp1/performance management agentscope:eqversion:-0

Trust: 0.3

vendor:hitachimodel:jp1/file access controlscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:jp1/cm2/submanagerscope:eqversion:06-71

Trust: 0.3

vendor:hitachimodel:jp1/cm2/submanager 06-51-/ascope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/cm2/submanagerscope:eqversion:06-51

Trust: 0.3

vendor:hitachimodel:jp1/cm2/submanager 06-00-/bscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/cm2/submanagerscope:eqversion:06-00

Trust: 0.3

vendor:hitachimodel:jp1/cm2/submanager 05-20-/b (windowscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/cm2/submanagerscope:eqversion:05-20

Trust: 0.3

vendor:hitachimodel:jp1/cm2/submanager 05-00-/a (windowscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/cm2/submanagerscope:eqversion:05-00

Trust: 0.3

vendor:hitachimodel:jp1/cm2/submanagerscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:jp1/cm2/operations assist submanager 07-00-/ascope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/cm2/operations assist submanager 06-71-/bscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/cm2/operations assist submanagerscope:eqversion:06-51

Trust: 0.3

vendor:hitachimodel:jp1/cm2/operations assist submanager (hi-ux/we2scope:eqversion:06-50(*2)

Trust: 0.3

vendor:hitachimodel:jp1/cm2/operations assist submanager 06-00-/a (hi-ux/scope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/cm2/operations assist submanager 05-20-/a (hi-ux/scope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/cm2/operations assist submanagerscope:eqversion:05-20

Trust: 0.3

vendor:hitachimodel:jp1/cm2/operations assist submanager (hi-ux/we2scope:eqversion:05-00(*2)

Trust: 0.3

vendor:hitachimodel:jp1/cm2/operations assist submanagerscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:jp1/cm2/operations assist manager 06-71-/fscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/cm2/operations assist manager 06-71-/bscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/cm2/operations assist manager 06-71-/ascope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/cm2/operations assist managerscope:eqversion:06-71(*2)

Trust: 0.3

vendor:hitachimodel:jp1/cm2/operations assist manager 06-50-/escope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/cm2/operations assist manager 06-50-/bscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/cm2/operations assist manager 06-00-/cscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/cm2/operations assist manager 05-20-/f (windowscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/cm2/operations assist manager 05-20-/cscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/cm2/operations assist managerscope:eqversion:05-20(*1)

Trust: 0.3

vendor:hitachimodel:jp1/cm2/operations assist manager 05-00-/c (windowscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/cm2/operations assist manager (hi-ux/we2scope:eqversion:05-00(*2)

Trust: 0.3

vendor:hitachimodel:jp1/cm2/operations assist managerscope:eqversion:05-00(*1)

Trust: 0.3

vendor:hitachimodel:jp1/cm2/operations assist managerscope:eqversion:05-00

Trust: 0.3

vendor:hitachimodel:jp1/cm2/operations assist managerscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:jp1/cm2/operation assist agentscope:eqversion:07-50

Trust: 0.3

vendor:hitachimodel:jp1/cm2/operation assist agentscope:eqversion:07-10

Trust: 0.3

vendor:hitachimodel:jp1/cm2/operation assist agent 07-00-/cscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/cm2/operation assist agentscope:eqversion:07-00

Trust: 0.3

vendor:hitachimodel:jp1/cm2/operation assist agentscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:jp1/cm2/network node manager enterprisescope:eqversion:0

Trust: 0.3

vendor:hitachimodel:jp1/cm2/network node managerscope:eqversion:2500

Trust: 0.3

vendor:hitachimodel:jp1/cm2/network node managerscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:jp1/cm2/extensible agent 06-71-/kscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/cm2/extensible agentscope:eqversion:06-71

Trust: 0.3

vendor:hitachimodel:jp1/cm2/extensible agent 06-50-/jscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/cm2/extensible agentscope:eqversion:06-50

Trust: 0.3

vendor:hitachimodel:jp1/cm2/extensible agentscope:eqversion:06-01

Trust: 0.3

vendor:hitachimodel:jp1/cm2/extensible agent 06-00-/escope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/cm2/extensible agentscope:eqversion:06-00

Trust: 0.3

vendor:hitachimodel:jp1/cm2/extensible agent 05-20-/k (windowscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/cm2/extensible agentscope:eqversion:05-20

Trust: 0.3

vendor:hitachimodel:jp1/cm2/extensible agent 05-00-/h (windowscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/cm2/extensible agentscope:eqversion:05-00

Trust: 0.3

vendor:hitachimodel:jp1/cm2/extensible agentscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:jp1/automatic job management system managerscope:eqversion:2-0

Trust: 0.3

vendor:hitachimodel:jp1/automatic job management system light editscope:eqversion:2-0

Trust: 0.3

vendor:hitachimodel:jp1/automatic job management system agentscope:eqversion:2-0

Trust: 0.3

vendor:hitachimodel:cm2/network node manager unlimitedscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:cm2/network node manager enterprisescope:eqversion:0

Trust: 0.3

vendor:hitachimodel:cm2/network node managerscope:eqversion:2500

Trust: 0.3

vendor:hitachimodel:jp1/cm2/submanager 06-71-/ascope:neversion: -

Trust: 0.3

vendor:hitachimodel:jp1/cm2/operations assist submanager 06-71-/cscope:neversion: -

Trust: 0.3

vendor:hitachimodel:jp1/cm2/operations assist manager 06-71-/gscope:neversion: -

Trust: 0.3

vendor:hitachimodel:jp1/cm2/operations assist manager 06-71-/cscope:neversion: -

Trust: 0.3

vendor:hitachimodel:jp1/cm2/operations assist manager 06-71-/bscope:neversion: -

Trust: 0.3

vendor:hitachimodel:jp1/cm2/operation assist agentscope:neversion:07-50-01

Trust: 0.3

vendor:hitachimodel:jp1/cm2/operation assist agent 07-10-/ascope:neversion: -

Trust: 0.3

vendor:hitachimodel:jp1/cm2/extensible agent 06-71-/lscope:neversion: -

Trust: 0.3

sources: CNVD: CNVD-2006-2723 // BID: 17706 // JVNDB: JVNDB-2006-000983 // CNNVD: CNNVD-200604-529 // NVD: CVE-2006-2068

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-2068
value: MEDIUM

Trust: 1.0

IPA: JVNDB-2006-000983
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2006-2723
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-200604-529
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2006-2068
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

IPA: JVNDB-2006-000983
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2006-2723
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

sources: CNVD: CNVD-2006-2723 // JVNDB: JVNDB-2006-000983 // CNNVD: CNNVD-200604-529 // NVD: CVE-2006-2068

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2006-2068

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200604-529

TYPE

Design Error

Trust: 0.9

sources: BID: 17706 // CNNVD: CNNVD-200604-529

CONFIGURATIONS

sources: JVNDB: JVNDB-2006-000983

PATCH

title:HS06-007url:http://www.hitachi-support.com/security_e/vuls_e/HS06-007_e/index-e.html

Trust: 0.8

sources: JVNDB: JVNDB-2006-000983

EXTERNAL IDS

db:NVDid:CVE-2006-2068

Trust: 3.3

db:BIDid:17706

Trust: 3.3

db:SECUNIAid:19841

Trust: 2.6

db:HITACHIid:HS06-007

Trust: 2.0

db:VUPENid:ADV-2006-1524

Trust: 1.6

db:XFid:26087

Trust: 1.4

db:JVNDBid:JVNDB-2006-000983

Trust: 0.8

db:CNVDid:CNVD-2006-2723

Trust: 0.6

db:XFid:1

Trust: 0.6

db:CNNVDid:CNNVD-200604-529

Trust: 0.6

db:PACKETSTORMid:45732

Trust: 0.1

sources: CNVD: CNVD-2006-2723 // BID: 17706 // JVNDB: JVNDB-2006-000983 // PACKETSTORM: 45732 // CNNVD: CNNVD-200604-529 // NVD: CVE-2006-2068

REFERENCES

url:http://www.securityfocus.com/bid/17706

Trust: 3.0

url:http://secunia.com/advisories/19841

Trust: 2.4

url:http://www.hitachi-support.com/security_e/vuls_e/hs06-007_e/index-e.html

Trust: 2.0

url:http://www.frsirt.com/english/advisories/2006/1524

Trust: 1.4

url:http://xforce.iss.net/xforce/xfdb/26087

Trust: 1.4

url:http://www.vupen.com/english/advisories/2006/1524

Trust: 1.0

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/26087

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2068

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2006-2068

Trust: 0.8

url:http://www.hitachi.com/

Trust: 0.3

url:http://www.hitachi.co.jp/prod/comp/soft1/global/prod/jp1/

Trust: 0.3

url:http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs06-007-09/index.html

Trust: 0.3

url:http://secunia.com/product/9571/

Trust: 0.1

url:http://secunia.com/product/9573/

Trust: 0.1

url:http://secunia.com/product/9572/

Trust: 0.1

url:http://secunia.com/product/9574/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/9570/

Trust: 0.1

url:http://secunia.com/product/9567/

Trust: 0.1

url:http://secunia.com/product/9566/

Trust: 0.1

url:http://secunia.com/product/9568/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/advisories/19841/

Trust: 0.1

sources: CNVD: CNVD-2006-2723 // BID: 17706 // JVNDB: JVNDB-2006-000983 // PACKETSTORM: 45732 // CNNVD: CNNVD-200604-529 // NVD: CVE-2006-2068

CREDITS

Hitachi

Trust: 0.6

sources: CNNVD: CNNVD-200604-529

SOURCES

db:CNVDid:CNVD-2006-2723
db:BIDid:17706
db:JVNDBid:JVNDB-2006-000983
db:PACKETSTORMid:45732
db:CNNVDid:CNNVD-200604-529
db:NVDid:CVE-2006-2068

LAST UPDATE DATE

2024-11-23T20:48:55.078000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2006-2723date:2006-04-27T00:00:00
db:BIDid:17706date:2008-10-18T17:17:00
db:JVNDBid:JVNDB-2006-000983date:2008-05-21T00:00:00
db:CNNVDid:CNNVD-200604-529date:2006-04-28T00:00:00
db:NVDid:CVE-2006-2068date:2024-11-21T00:10:28.913

SOURCES RELEASE DATE

db:CNVDid:CNVD-2006-2723date:2006-04-27T00:00:00
db:BIDid:17706date:2006-04-26T00:00:00
db:JVNDBid:JVNDB-2006-000983date:2008-05-21T00:00:00
db:PACKETSTORMid:45732date:2006-04-27T21:57:26
db:CNNVDid:CNNVD-200604-529date:2006-04-27T00:00:00
db:NVDid:CVE-2006-2068date:2006-04-27T13:34:00