ID

VAR-200701-0391


CVE

CVE-2007-0513


TITLE

Hitachi HiRDB Datareplicator Service disruption (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2007-003271

DESCRIPTION

Hitachi HiRDB Datareplicator 7HiRDB, 7(64), 6, 6(64), 5.0, and 5.0(64); and various products that bundle HiRDB Datareplicator; allows attackers to cause a denial of service (CPU consumption) via certain data. Hitachi HiRDB Datareplicator is prone to a remote denial-of-service vulnerability. ---------------------------------------------------------------------- Secunia is proud to announce the availability of the Secunia Software Inspector. The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor. Try it out online: http://secunia.com/software_inspector/ ---------------------------------------------------------------------- TITLE: Hitachi HiRDB DataReplicator Denial of Service Vulnerability SECUNIA ADVISORY ID: SA23816 VERIFY ADVISORY: http://secunia.com/advisories/23816/ CRITICAL: Less critical IMPACT: DoS WHERE: >From local network SOFTWARE: Hitachi HiRDB DataReplicator 5.x http://secunia.com/product/13320/ http://secunia.com/product// Hitachi HiRDB DataReplicator 6.x http://secunia.com/product/13318/ http://secunia.com/product// Hitachi HiRDB DataReplicator 7.x http://secunia.com/product/13316/ http://secunia.com/product// DESCRIPTION: A vulnerability has been reported in Hitachi HiRDB DataReplicator, which can be exploited by malicious people to cause a DoS (Denial of Service). See the vendor advisory for a matrix of affected versions. SOLUTION: Updates are available for some versions (see the vendor's advisory for details). PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://www.hitachi-support.com/security_e/vuls_e/HS06-023_e/01-e.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 1.98

sources: NVD: CVE-2007-0513 // JVNDB: JVNDB-2007-003271 // BID: 22244 // PACKETSTORM: 53938

AFFECTED PRODUCTS

vendor:hitachimodel:hirdb datareplicatorscope:eqversion:6

Trust: 2.7

vendor:hitachimodel:hirdb datareplicatorscope:eqversion:5.0

Trust: 2.4

vendor:hitachimodel:hirdb workgroup serverscope:eqversion:6

Trust: 1.9

vendor:hitachimodel:hirdb parallel serverscope:eqversion:6

Trust: 1.9

vendor:hitachimodel:hirdb datareplicatorscope:eqversion:7

Trust: 1.9

vendor:hitachimodel:hirdb datareplicatorscope:eqversion:6_64

Trust: 1.6

vendor:hitachimodel:hirdb single server workgroup editionscope:eqversion:5.0

Trust: 1.6

vendor:hitachimodel:hirdb datareplicatorscope:eqversion:7_64

Trust: 1.6

vendor:hitachimodel:hirdb datareplicatorscope:eqversion:5.0_64

Trust: 1.6

vendor:hitachimodel:hirdb parallel serverscope:eqversion:4.0

Trust: 1.6

vendor:hitachimodel:hirdb single serverscope:eqversion:7

Trust: 1.3

vendor:hitachimodel:hirdb single serverscope:eqversion:6

Trust: 1.3

vendor:hitachimodel:hirdb parallel serverscope:eqversion:7

Trust: 1.3

vendor:hitachimodel:hirdb datareplicatorscope:eqversion:6(64)

Trust: 1.1

vendor:hitachimodel:hirdb single serverscope:eqversion:5.0

Trust: 1.0

vendor:hitachimodel:hirdb parallel serverscope:eqversion:5.0

Trust: 1.0

vendor:hitachimodel:hirdb single serverscope:eqversion:4.0

Trust: 1.0

vendor:hitachimodel:hirdb datareplicatorscope:eqversion:7hirdb

Trust: 0.8

vendor:hitachimodel:hirdb datareplicatorscope:eqversion:7(64)

Trust: 0.8

vendor:hitachimodel:hirdb datareplicatorscope:eqversion:5.0(64)

Trust: 0.8

vendor:hitachimodel:hirdb single server workgroup editionscope:eqversion:5

Trust: 0.3

vendor:hitachimodel:hirdb single server versionscope:eqversion:5

Trust: 0.3

vendor:hitachimodel:hirdb single serverscope:eqversion:4

Trust: 0.3

vendor:hitachimodel:hirdb parallel serverscope:eqversion:5

Trust: 0.3

vendor:hitachimodel:hirdb datareplicator versionscope:eqversion:7(64)

Trust: 0.3

vendor:hitachimodel:hirdb datareplicatorscope:eqversion:5.0(64))

Trust: 0.3

vendor:hitachimodel:hirdb datareplicatorscope:eqversion:5

Trust: 0.3

vendor:hitachimodel:hirdb datareplicatorscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:hirdb control manager serverscope:eqversion:-0

Trust: 0.3

sources: BID: 22244 // JVNDB: JVNDB-2007-003271 // CNNVD: CNNVD-200701-463 // NVD: CVE-2007-0513

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-0513
value: MEDIUM

Trust: 1.0

NVD: CVE-2007-0513
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200701-463
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2007-0513
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

sources: JVNDB: JVNDB-2007-003271 // CNNVD: CNNVD-200701-463 // NVD: CVE-2007-0513

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2007-0513

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200701-463

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200701-463

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-003271

PATCH

title:HS06-023url:http://www.hitachi.co.jp/Prod/comp/soft1/global/security/pdf/HS06-023.pdf

Trust: 0.8

sources: JVNDB: JVNDB-2007-003271

EXTERNAL IDS

db:NVDid:CVE-2007-0513

Trust: 2.7

db:HITACHIid:HS06-023

Trust: 2.0

db:BIDid:22244

Trust: 1.9

db:SECUNIAid:23816

Trust: 1.8

db:OSVDBid:32996

Trust: 1.6

db:VUPENid:ADV-2007-0327

Trust: 1.6

db:JVNDBid:JVNDB-2007-003271

Trust: 0.8

db:XFid:31735

Trust: 0.6

db:CNNVDid:CNNVD-200701-463

Trust: 0.6

db:PACKETSTORMid:53938

Trust: 0.1

sources: BID: 22244 // JVNDB: JVNDB-2007-003271 // PACKETSTORM: 53938 // CNNVD: CNNVD-200701-463 // NVD: CVE-2007-0513

REFERENCES

url:http://www.hitachi-support.com/security_e/vuls_e/hs06-023_e/01-e.html

Trust: 2.0

url:http://osvdb.org/32996

Trust: 1.6

url:http://www.securityfocus.com/bid/22244

Trust: 1.6

url:http://secunia.com/advisories/23816

Trust: 1.6

url:http://www.vupen.com/english/advisories/2007/0327

Trust: 1.0

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/31735

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0513

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-0513

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2007/0327

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/31735

Trust: 0.6

url:http://www.hitachi.com

Trust: 0.3

url:http://secunia.com/product/13320/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product//

Trust: 0.1

url:http://secunia.com/software_inspector/

Trust: 0.1

url:http://secunia.com/advisories/23816/

Trust: 0.1

url:http://secunia.com/product/13318/

Trust: 0.1

url:http://secunia.com/product/13316/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: BID: 22244 // JVNDB: JVNDB-2007-003271 // PACKETSTORM: 53938 // CNNVD: CNNVD-200701-463 // NVD: CVE-2007-0513

CREDITS

The vendor disclosed this issue.

Trust: 0.9

sources: BID: 22244 // CNNVD: CNNVD-200701-463

SOURCES

db:BIDid:22244
db:JVNDBid:JVNDB-2007-003271
db:PACKETSTORMid:53938
db:CNNVDid:CNNVD-200701-463
db:NVDid:CVE-2007-0513

LAST UPDATE DATE

2025-04-10T23:22:33.510000+00:00


SOURCES UPDATE DATE

db:BIDid:22244date:2015-05-12T19:35:00
db:JVNDBid:JVNDB-2007-003271date:2012-09-25T00:00:00
db:CNNVDid:CNNVD-200701-463date:2007-01-26T00:00:00
db:NVDid:CVE-2007-0513date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:BIDid:22244date:2007-01-25T00:00:00
db:JVNDBid:JVNDB-2007-003271date:2012-09-25T00:00:00
db:PACKETSTORMid:53938date:2007-01-27T01:46:45
db:CNNVDid:CNNVD-200701-463date:2007-01-25T00:00:00
db:NVDid:CVE-2007-0513date:2007-01-26T00:28:00