var-200604-0570
Vulnerability from variot

Unspecified vulnerability in Hitachi JP1 products allow remote attackers to cause a denial of service (application stop or fail) via unexpected requests or data. Unknown vulnerability in Hitachi JP1 product. Multiple JP1 products are prone to a denial-of-service vulnerability. This issue affects multiple models and versions of Hitachi JP1 products. Specific models and versions will be listed in future revisions of this BID.

TITLE: Hitachi Multiple JP1 Products Denial of Service

SECUNIA ADVISORY ID: SA19841

VERIFY ADVISORY: http://secunia.com/advisories/19841/

CRITICAL: Moderately critical

IMPACT: DoS

WHERE:

From remote

SOFTWARE: Hitachi JP1/Server Conductor/Server Manager http://secunia.com/product/9572/ Hitachi JP1/Server Conductor/Blade Server Manager http://secunia.com/product/9571/ Hitachi JP1/Security Integrated Manager http://secunia.com/product/9574/ Hitachi JP1/PFM/SNMP System Observer (SSO) http://secunia.com/product/9566/ Hitachi JP1/Performance Management (PFM) http://secunia.com/product/9568/ Hitachi JP1/File Access Control http://secunia.com/product/9573/ Hitachi JP1/Cm2/Network Node Manager http://secunia.com/product/9570/ Hitachi JP1/Automatic Job Management System 2 (AJS2) http://secunia.com/product/9567/

DESCRIPTION: A vulnerability has been reported in multiple JP1 products, which can be exploited by malicious people to cause a DoS (Denial of Service).

The vulnerability is caused due to an error when handling certain specially crafted data or requests. This can be exploited to cause the products to stop responding.

The vulnerability has been reported in the following products: * JP1/PFM/SNMP System Observer * JP1/Server System Observer * JP1/Automatic Job Management System 2 * JP1/Performance Management * Cm2/Network Node Manager Enterprise/Unlimited/250, * JP1/Cm2/Network Node Manager Enterprise/250 * JP1/Server Conductor/Blade Server Manager * JP1/Server Conductor/Server Manager * Server Conductor/Blade Server Manager * Server Conductor/Server Manager * System Manager - Management Console * JP1/File Access Control * JP1/Security Integrated Manager

SOLUTION: Apply patches (see patch matrix in the vendor advisory).

PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.

ORIGINAL ADVISORY: http://www.hitachi-support.com/security_e/vuls_e/HS06-007_e/index-e.html


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200604-0570",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "jp1-cm2-network node manager 250",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "hitachi",
        "version": "05_20"
      },
      {
        "model": "jp1-cm2-network node manager 250",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "hitachi",
        "version": "06_00"
      },
      {
        "model": "jp1/cm2/operations assist submanager",
        "scope": "eq",
        "trust": 1.2,
        "vendor": "hitachi",
        "version": "07-50"
      },
      {
        "model": "jp1/cm2/operations assist submanager",
        "scope": "eq",
        "trust": 1.2,
        "vendor": "hitachi",
        "version": "07-10"
      },
      {
        "model": "jp1/cm2/operations assist submanager",
        "scope": "eq",
        "trust": 1.2,
        "vendor": "hitachi",
        "version": "07-00"
      },
      {
        "model": "jp1/cm2/operations assist submanager",
        "scope": "ne",
        "trust": 1.2,
        "vendor": "hitachi",
        "version": "07-50-01"
      },
      {
        "model": "jpi performance management",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "*"
      },
      {
        "model": "jp1-cm2-network node manager",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "05_20"
      },
      {
        "model": "jpi security integrated manager",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "*"
      },
      {
        "model": "jpi automatic job management system 2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "*"
      },
      {
        "model": "jpi server conductor blade server manager",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "*"
      },
      {
        "model": "jpi server conductor server manager",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "*"
      },
      {
        "model": "jpi server system observer - report feature",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "*"
      },
      {
        "model": "jpi pfm snmp system observer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "*"
      },
      {
        "model": "jp1/cm2/operations assist submanager",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "hitachi",
        "version": "06-71"
      },
      {
        "model": "jp1/cm2/operations assist submanager",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "hitachi",
        "version": "06-00"
      },
      {
        "model": "jp1/cm2/operations assist manager",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "hitachi",
        "version": "07-50-02"
      },
      {
        "model": "jp1/cm2/operations assist manager",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "hitachi",
        "version": "07-50"
      },
      {
        "model": "jp1/cm2/operations assist manager",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "hitachi",
        "version": "07-11"
      },
      {
        "model": "jp1/cm2/operations assist manager",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "hitachi",
        "version": "07-10"
      },
      {
        "model": "jp1/cm2/operations assist manager",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "hitachi",
        "version": "07-00"
      },
      {
        "model": "jp1/cm2/operations assist manager",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "hitachi",
        "version": "06-71"
      },
      {
        "model": "jp1/cm2/operations assist manager",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "hitachi",
        "version": "06-50"
      },
      {
        "model": "jp1/cm2/operations assist manager",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "hitachi",
        "version": "06-00"
      },
      {
        "model": "jp1/cm2/operations assist manager",
        "scope": "ne",
        "trust": 0.9,
        "vendor": "hitachi",
        "version": "07-50-03"
      },
      {
        "model": "cm2/network node manager",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "250"
      },
      {
        "model": "cm2/network node manager",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "enterprise"
      },
      {
        "model": "cm2/network node manager",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "unlimited"
      },
      {
        "model": "job management partner 1/automatic job management system 2",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "agent"
      },
      {
        "model": "job management partner 1/automatic job management system 2",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "manager"
      },
      {
        "model": "job management partner 1/base",
        "scope": null,
        "trust": 0.8,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/automatic job management system 2",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "agent"
      },
      {
        "model": "jp1/automatic job management system 2",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "light edition"
      },
      {
        "model": "jp1/automatic job management system 2",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "manager"
      },
      {
        "model": "jp1/base",
        "scope": null,
        "trust": 0.8,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/cm2/extensible agent",
        "scope": null,
        "trust": 0.8,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/cm2/hierarchical agent",
        "scope": null,
        "trust": 0.8,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/cm2/network node manager",
        "scope": null,
        "trust": 0.8,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/cm2/network node manager",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "250"
      },
      {
        "model": "jp1/cm2/network node manager",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "enterprise"
      },
      {
        "model": "jp1/cm2/operations assist",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "agent"
      },
      {
        "model": "jp1/cm2/operations assist",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "manager"
      },
      {
        "model": "jp1/cm2/operations assist",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "submanager"
      },
      {
        "model": "jp1/cm2/submanager",
        "scope": null,
        "trust": 0.8,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/file access control",
        "scope": null,
        "trust": 0.8,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/performance management",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "agent"
      },
      {
        "model": "jp1/performance management",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "manager"
      },
      {
        "model": "jp1/performance management",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "view"
      },
      {
        "model": "jp1/pfm/snmp system observer",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "report feature"
      },
      {
        "model": "jp1/security integrated manager",
        "scope": null,
        "trust": 0.8,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/security integrated manager",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "runtime library"
      },
      {
        "model": "jp1/server system observer",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "report feature"
      },
      {
        "model": "jp1/serverconductor/blade server manager",
        "scope": null,
        "trust": 0.8,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/serverconductor/deployment manager",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "enterprise edition"
      },
      {
        "model": "jp1/serverconductor/deployment manager",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "standard edition"
      },
      {
        "model": "jp1/serverconductor/server manager",
        "scope": null,
        "trust": 0.8,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "serverconductor/blade server manager",
        "scope": null,
        "trust": 0.8,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "serverconductor/deployment manager",
        "scope": null,
        "trust": 0.8,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "serverconductor/server manager",
        "scope": null,
        "trust": 0.8,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "system manager",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "management console"
      },
      {
        "model": "node manager hitachi 05 20",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "jp1 cm2 network",
        "version": "250"
      },
      {
        "model": "node manager hitachi 06 00",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "jp1 cm2 network",
        "version": "250"
      },
      {
        "model": "jp1/cm2/operations assist submanager",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hitachi",
        "version": "06-50"
      },
      {
        "model": "jp1/cm2/operations assist submanager 06-00-/a",
        "scope": null,
        "trust": 0.6,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/cm2/operations assist submanager",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hitachi",
        "version": "05-20(*1)"
      },
      {
        "model": "jp1/cm2/operations assist submanager",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hitachi",
        "version": "05-00(*1)"
      },
      {
        "model": "jp1/cm2/operations assist manager 07-00-/b",
        "scope": null,
        "trust": 0.6,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/cm2/operations assist manager 06-00-/b",
        "scope": null,
        "trust": 0.6,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/cm2/operations assist manager",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hitachi",
        "version": "05-20"
      },
      {
        "model": "jp1/cm2/operations assist submanager 06-71-/a",
        "scope": "ne",
        "trust": 0.6,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jpi pfm snmp system observer",
        "scope": null,
        "trust": 0.6,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jpi security integrated manager",
        "scope": null,
        "trust": 0.6,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jpi server conductor server manager",
        "scope": null,
        "trust": 0.6,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jpi automatic job management system 2",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hitachi",
        "version": "agent"
      },
      {
        "model": "jpi automatic job management system 2",
        "scope": null,
        "trust": 0.6,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1-cm2-network node manager",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hitachi",
        "version": "05_20"
      },
      {
        "model": "jpi performance management",
        "scope": null,
        "trust": 0.6,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jpi server system observer - report feature",
        "scope": null,
        "trust": 0.6,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "system manager management console",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "-0"
      },
      {
        "model": "server conductor/server manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "0"
      },
      {
        "model": "server conductor/blade server manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "0"
      },
      {
        "model": "jp1/server conductor/server manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "0"
      },
      {
        "model": "jp1/server conductor/blade server manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "0"
      },
      {
        "model": "jp1/security integrated manager runtime library",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "-0"
      },
      {
        "model": "jp1/security integrated manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "0"
      },
      {
        "model": "jp1/pfm/snmp system observer report feature",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "-0"
      },
      {
        "model": "jp1/performance management view",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "-0"
      },
      {
        "model": "jp1/performance management manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "-0"
      },
      {
        "model": "jp1/performance management agent",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "-0"
      },
      {
        "model": "jp1/file access control",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "0"
      },
      {
        "model": "jp1/cm2/submanager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "06-71"
      },
      {
        "model": "jp1/cm2/submanager 06-51-/a",
        "scope": null,
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/cm2/submanager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "06-51"
      },
      {
        "model": "jp1/cm2/submanager 06-00-/b",
        "scope": null,
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/cm2/submanager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "06-00"
      },
      {
        "model": "jp1/cm2/submanager 05-20-/b (window",
        "scope": null,
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/cm2/submanager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "05-20"
      },
      {
        "model": "jp1/cm2/submanager 05-00-/a (window",
        "scope": null,
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/cm2/submanager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "05-00"
      },
      {
        "model": "jp1/cm2/submanager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "0"
      },
      {
        "model": "jp1/cm2/operations assist submanager 07-00-/a",
        "scope": null,
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/cm2/operations assist submanager 06-71-/b",
        "scope": null,
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/cm2/operations assist submanager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "06-51"
      },
      {
        "model": "jp1/cm2/operations assist submanager (hi-ux/we2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "06-50(*2)"
      },
      {
        "model": "jp1/cm2/operations assist submanager 06-00-/a (hi-ux/",
        "scope": null,
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/cm2/operations assist submanager 05-20-/a (hi-ux/",
        "scope": null,
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/cm2/operations assist submanager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "05-20"
      },
      {
        "model": "jp1/cm2/operations assist submanager (hi-ux/we2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "05-00(*2)"
      },
      {
        "model": "jp1/cm2/operations assist submanager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "0"
      },
      {
        "model": "jp1/cm2/operations assist manager 06-71-/f",
        "scope": null,
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/cm2/operations assist manager 06-71-/b",
        "scope": null,
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/cm2/operations assist manager 06-71-/a",
        "scope": null,
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/cm2/operations assist manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "06-71(*2)"
      },
      {
        "model": "jp1/cm2/operations assist manager 06-50-/e",
        "scope": null,
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/cm2/operations assist manager 06-50-/b",
        "scope": null,
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/cm2/operations assist manager 06-00-/c",
        "scope": null,
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/cm2/operations assist manager 05-20-/f (window",
        "scope": null,
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/cm2/operations assist manager 05-20-/c",
        "scope": null,
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/cm2/operations assist manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "05-20(*1)"
      },
      {
        "model": "jp1/cm2/operations assist manager 05-00-/c (window",
        "scope": null,
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/cm2/operations assist manager (hi-ux/we2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "05-00(*2)"
      },
      {
        "model": "jp1/cm2/operations assist manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "05-00(*1)"
      },
      {
        "model": "jp1/cm2/operations assist manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "05-00"
      },
      {
        "model": "jp1/cm2/operations assist manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "0"
      },
      {
        "model": "jp1/cm2/operation assist agent",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "07-50"
      },
      {
        "model": "jp1/cm2/operation assist agent",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "07-10"
      },
      {
        "model": "jp1/cm2/operation assist agent 07-00-/c",
        "scope": null,
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/cm2/operation assist agent",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "07-00"
      },
      {
        "model": "jp1/cm2/operation assist agent",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "0"
      },
      {
        "model": "jp1/cm2/network node manager enterprise",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "0"
      },
      {
        "model": "jp1/cm2/network node manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "2500"
      },
      {
        "model": "jp1/cm2/network node manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "0"
      },
      {
        "model": "jp1/cm2/extensible agent 06-71-/k",
        "scope": null,
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/cm2/extensible agent",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "06-71"
      },
      {
        "model": "jp1/cm2/extensible agent 06-50-/j",
        "scope": null,
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/cm2/extensible agent",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "06-50"
      },
      {
        "model": "jp1/cm2/extensible agent",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "06-01"
      },
      {
        "model": "jp1/cm2/extensible agent 06-00-/e",
        "scope": null,
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/cm2/extensible agent",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "06-00"
      },
      {
        "model": "jp1/cm2/extensible agent 05-20-/k (window",
        "scope": null,
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/cm2/extensible agent",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "05-20"
      },
      {
        "model": "jp1/cm2/extensible agent 05-00-/h (window",
        "scope": null,
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/cm2/extensible agent",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "05-00"
      },
      {
        "model": "jp1/cm2/extensible agent",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "0"
      },
      {
        "model": "jp1/automatic job management system manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "2-0"
      },
      {
        "model": "jp1/automatic job management system light edit",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "2-0"
      },
      {
        "model": "jp1/automatic job management system agent",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "2-0"
      },
      {
        "model": "cm2/network node manager unlimited",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "0"
      },
      {
        "model": "cm2/network node manager enterprise",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "0"
      },
      {
        "model": "cm2/network node manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "2500"
      },
      {
        "model": "jp1/cm2/submanager 06-71-/a",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/cm2/operations assist submanager 06-71-/c",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/cm2/operations assist manager 06-71-/g",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/cm2/operations assist manager 06-71-/c",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/cm2/operations assist manager 06-71-/b",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/cm2/operation assist agent",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "07-50-01"
      },
      {
        "model": "jp1/cm2/operation assist agent 07-10-/a",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/cm2/extensible agent 06-71-/l",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-2723"
      },
      {
        "db": "BID",
        "id": "17706"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000983"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-2068"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200604-529"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:hitachi:jpi_security_integrated_manager:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hitachi:jpi_server_conductor_blade_server_manager:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hitachi:jp1-cm2-network_node_manager_250:05_20:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hitachi:jpi_server_conductor_server_manager:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hitachi:jpi_server_system_observer_-_report_feature:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hitachi:jp1-cm2-network_node_manager_250:06_00:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hitachi:jpi_automatic_job_management_system_2:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hitachi:jpi_automatic_job_management_system_2:*:*:agent:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hitachi:jp1-cm2-network_node_manager:*:*:enterprise:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "05_20",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hitachi:jpi_performance_management:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hitachi:jpi_pfm_snmp_system_observer:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2006-2068"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Hitachi",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200604-529"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2006-2068",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "IPA",
            "availabilityImpact": "Partial",
            "baseScore": 5.0,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2006-000983",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2006-2723",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2006-2068",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2006-000983",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2006-2723",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200604-529",
            "trust": 0.6,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-2723"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000983"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-2068"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200604-529"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Unspecified vulnerability in Hitachi JP1 products allow remote attackers to cause a denial of service (application stop or fail) via unexpected requests or data. Unknown vulnerability in Hitachi JP1 product. Multiple JP1 products are prone to a denial-of-service vulnerability. \nThis issue affects multiple models and versions of Hitachi JP1 products. Specific models and versions will be listed in future revisions of this BID. \n\nTITLE:\nHitachi Multiple JP1 Products Denial of Service\n\nSECUNIA ADVISORY ID:\nSA19841\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/19841/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nDoS\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\nHitachi JP1/Server Conductor/Server Manager\nhttp://secunia.com/product/9572/\nHitachi JP1/Server Conductor/Blade Server Manager\nhttp://secunia.com/product/9571/\nHitachi JP1/Security Integrated Manager\nhttp://secunia.com/product/9574/\nHitachi JP1/PFM/SNMP System Observer (SSO)\nhttp://secunia.com/product/9566/\nHitachi JP1/Performance Management (PFM)\nhttp://secunia.com/product/9568/\nHitachi JP1/File Access Control\nhttp://secunia.com/product/9573/\nHitachi JP1/Cm2/Network Node Manager\nhttp://secunia.com/product/9570/\nHitachi JP1/Automatic Job Management System 2 (AJS2)\nhttp://secunia.com/product/9567/\n\nDESCRIPTION:\nA vulnerability has been reported in multiple JP1 products, which can\nbe exploited by malicious people to cause a DoS (Denial of Service). \n\nThe vulnerability is caused due to an error when handling certain\nspecially crafted data or requests. This can be exploited to cause\nthe products to stop responding. \n\nThe vulnerability has been reported in the following products:\n* JP1/PFM/SNMP System Observer\n* JP1/Server System Observer\n* JP1/Automatic Job Management System 2\n* JP1/Performance Management\n* Cm2/Network Node Manager Enterprise/Unlimited/250,\n* JP1/Cm2/Network Node Manager Enterprise/250\n* JP1/Server Conductor/Blade Server Manager\n* JP1/Server Conductor/Server Manager\n* Server Conductor/Blade Server Manager\n* Server Conductor/Server Manager\n* System Manager - Management Console\n* JP1/File Access Control\n* JP1/Security Integrated Manager\n\nSOLUTION:\nApply patches (see patch matrix in the vendor advisory). \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nhttp://www.hitachi-support.com/security_e/vuls_e/HS06-007_e/index-e.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2006-2068"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000983"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2006-2723"
      },
      {
        "db": "BID",
        "id": "17706"
      },
      {
        "db": "PACKETSTORM",
        "id": "45732"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2006-2068",
        "trust": 3.3
      },
      {
        "db": "BID",
        "id": "17706",
        "trust": 3.3
      },
      {
        "db": "SECUNIA",
        "id": "19841",
        "trust": 2.6
      },
      {
        "db": "HITACHI",
        "id": "HS06-007",
        "trust": 2.0
      },
      {
        "db": "VUPEN",
        "id": "ADV-2006-1524",
        "trust": 1.6
      },
      {
        "db": "XF",
        "id": "26087",
        "trust": 1.4
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000983",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2006-2723",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "1",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200604-529",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "45732",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-2723"
      },
      {
        "db": "BID",
        "id": "17706"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000983"
      },
      {
        "db": "PACKETSTORM",
        "id": "45732"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-2068"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200604-529"
      }
    ]
  },
  "id": "VAR-200604-0570",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-2723"
      }
    ],
    "trust": 1.09782103625
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-2723"
      }
    ]
  },
  "last_update_date": "2023-12-18T11:31:41.233000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "HS06-007",
        "trust": 0.8,
        "url": "http://www.hitachi-support.com/security_e/vuls_e/hs06-007_e/index-e.html"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000983"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2006-2068"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.0,
        "url": "http://www.securityfocus.com/bid/17706"
      },
      {
        "trust": 2.4,
        "url": "http://secunia.com/advisories/19841"
      },
      {
        "trust": 2.0,
        "url": "http://www.hitachi-support.com/security_e/vuls_e/hs06-007_e/index-e.html"
      },
      {
        "trust": 1.4,
        "url": "http://www.frsirt.com/english/advisories/2006/1524"
      },
      {
        "trust": 1.4,
        "url": "http://xforce.iss.net/xforce/xfdb/26087"
      },
      {
        "trust": 1.0,
        "url": "http://www.vupen.com/english/advisories/2006/1524"
      },
      {
        "trust": 1.0,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26087"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2068"
      },
      {
        "trust": 0.8,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2006-2068"
      },
      {
        "trust": 0.3,
        "url": "http://www.hitachi.com/"
      },
      {
        "trust": 0.3,
        "url": "http://www.hitachi.co.jp/prod/comp/soft1/global/prod/jp1/"
      },
      {
        "trust": 0.3,
        "url": "http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs06-007-09/index.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/9571/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/9573/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/9572/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/9574/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/9570/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/9567/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/9566/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/9568/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/19841/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-2723"
      },
      {
        "db": "BID",
        "id": "17706"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000983"
      },
      {
        "db": "PACKETSTORM",
        "id": "45732"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-2068"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200604-529"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-2723"
      },
      {
        "db": "BID",
        "id": "17706"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000983"
      },
      {
        "db": "PACKETSTORM",
        "id": "45732"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-2068"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200604-529"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2006-04-27T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2006-2723"
      },
      {
        "date": "2006-04-26T00:00:00",
        "db": "BID",
        "id": "17706"
      },
      {
        "date": "2008-05-21T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2006-000983"
      },
      {
        "date": "2006-04-27T21:57:26",
        "db": "PACKETSTORM",
        "id": "45732"
      },
      {
        "date": "2006-04-27T13:34:00",
        "db": "NVD",
        "id": "CVE-2006-2068"
      },
      {
        "date": "2006-04-27T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200604-529"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2006-04-27T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2006-2723"
      },
      {
        "date": "2008-10-18T17:17:00",
        "db": "BID",
        "id": "17706"
      },
      {
        "date": "2008-05-21T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2006-000983"
      },
      {
        "date": "2017-07-20T01:31:09.287000",
        "db": "NVD",
        "id": "CVE-2006-2068"
      },
      {
        "date": "2006-04-28T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200604-529"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200604-529"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Hitachi JP1 Denial of Service Vulnerability",
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-2723"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200604-529"
      }
    ],
    "trust": 1.2
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Design Error",
    "sources": [
      {
        "db": "BID",
        "id": "17706"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200604-529"
      }
    ],
    "trust": 0.9
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.