jvndb-2010-001875
Vulnerability from jvndb
Published
2010-09-01 14:11
Modified
2010-09-01 14:11
Summary
Denial of Service (DoS) Vulnerability in JP1/ServerConductor/Control Manager
Details
A built-in database in JP1/ServerConductor/Control Manager contains a vulnerability that could cause a denial of service (DoS) condition due to the abnormal ending of the database process when receiving unexpected data.
After the process abends, the service can be restarted by rebooting the system.
Impacted products
▼ | Vendor | Product |
---|---|---|
Hitachi, Ltd | JP1/ServerConductor/Control Manager |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-001875.html", "dc:date": "2010-09-01T14:11+09:00", "dcterms:issued": "2010-09-01T14:11+09:00", "dcterms:modified": "2010-09-01T14:11+09:00", description: "A built-in database in JP1/ServerConductor/Control Manager contains a vulnerability that could cause a denial of service (DoS) condition due to the abnormal ending of the database process when receiving unexpected data.\r\nAfter the process abends, the service can be restarted by rebooting the system.", link: "https://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-001875.html", "sec:cpe": { "#text": "cpe:/a:hitachi:jp1_serverconductor_control_manager", "@product": "JP1/ServerConductor/Control Manager", "@vendor": "Hitachi, Ltd", "@version": "2.2", }, "sec:cvss": { "@score": "5.0", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "@version": "2.0", }, "sec:identifier": "JVNDB-2010-001875", "sec:references": { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-noinfo", "@title": "No Mapping(CWE-noinfo)", }, title: "Denial of Service (DoS) Vulnerability in JP1/ServerConductor/Control Manager", }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.