Search criteria
1 vulnerability found for TP1/Message Control by Hitachi, Ltd
JVNDB-2010-001518
Vulnerability from jvndb - Published: 2010-06-22 11:23 - Updated:2010-06-22 11:23Summary
TP1/Message Control Denial of Service (DoS) Vulnerability
Details
The port used by TP1/Message Control's mapping service has a vulnerability where the port is forced to keep collecting debug information when it receives a maliciously-crafted message, which in turn causes the depletion of the disk resource and leads to a denial of service (DoS) condition.
References
| Type | URL | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-001518.html",
"dc:date": "2010-06-22T11:23+09:00",
"dcterms:issued": "2010-06-22T11:23+09:00",
"dcterms:modified": "2010-06-22T11:23+09:00",
"description": "The port used by TP1/Message Control\u0027s mapping service has a vulnerability where the port is forced to keep collecting debug information when it receives a maliciously-crafted message, which in turn causes the depletion of the disk resource and leads to a denial of service (DoS) condition.",
"link": "https://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-001518.html",
"sec:cpe": [
{
"#text": "cpe:/a:hitachi:tp1_message_control",
"@product": "TP1/Message Control",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:ucosminexus_tp1_message_control",
"@product": "uCosminexus TP1/Message Control",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
}
],
"sec:cvss": {
"@score": "5.0",
"@severity": "Medium",
"@type": "Base",
"@vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"@version": "2.0"
},
"sec:identifier": "JVNDB-2010-001518",
"sec:references": {
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-20",
"@title": "Improper Input Validation(CWE-20)"
},
"title": "TP1/Message Control Denial of Service (DoS) Vulnerability"
}