ID

VAR-200711-0182


CVE

CVE-2007-6146


TITLE

Hitachi JP1/File Transmission Server/FTP Denial Of Service Vulnerability

Trust: 1.1

sources: BID: 26542 // JVNDB: JVNDB-2007-001000

DESCRIPTION

Hitachi JP1/File Transmission Server/FTP 01-00 through 08-10-02 on Windows might allow remote attackers to cause a denial of service (service stop) via a "specific file" argument to an FTP command. Hitachi JP1/File Transmission Server/FTP is prone to a denial-of-service vulnerability due to an unspecified error. ---------------------------------------------------------------------- 2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published How do you know which Secunia advisories are important to you? The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively. Get a free trial of the Secunia Vulnerability Intelligence Solutions: http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv ---------------------------------------------------------------------- TITLE: JP1/File Transmission Server/FTP Authentication Bypass and DoS SECUNIA ADVISORY ID: SA27735 VERIFY ADVISORY: http://secunia.com/advisories/27735/ CRITICAL: Moderately critical IMPACT: Security Bypass, DoS WHERE: >From remote SOFTWARE: Hitachi JP1/File Transmission Server/FTP http://secunia.com/product/3821/ DESCRIPTION: Two vulnerabilities have been reported in JP1/File Transmission Server/FTP, which can be exploited by malicious users to cause a DoS (Denial of Service) and by malicious people to bypass certain security restrictions. 1) An unspecified error can be exploited to bypass authentication and view files in a specific directory. The vulnerability affects HP-UX, HP-UX(IPF), AIX, Solaris, Linux, Linux(IPF), HP-UX(English version), and HI-UX/WE2. The vulnerability affects Windows(x86), Windows(IPF), Windows(English version), and Windows9X. SOLUTION: Update to the latest versions (please see vendor advisories for details). PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://www.hitachi-support.com/security_e/vuls_e/HS07-037_e/index-e.html http://www.hitachi-support.com/security_e/vuls_e/HS07-038_e/index-e.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 1.98

sources: NVD: CVE-2007-6146 // JVNDB: JVNDB-2007-001000 // BID: 26542 // PACKETSTORM: 61096

AFFECTED PRODUCTS

vendor:hitachimodel:jp1 file transmission serverscope:eqversion:07_00

Trust: 1.6

vendor:hitachimodel:jp1/file transmission server/ftpscope: - version: -

Trust: 0.8

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:08-10

Trust: 0.6

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:08-00

Trust: 0.6

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:07-10

Trust: 0.6

vendor:hitachimodel:jp1/file transmission server/ftp 06-00-/ascope: - version: -

Trust: 0.6

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:06-00

Trust: 0.6

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:05-01

Trust: 0.6

vendor:hitachimodel:jp1/file transmission server/ftp 05-00-/ascope: - version: -

Trust: 0.6

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:05-00

Trust: 0.6

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:01-00

Trust: 0.6

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:08-10-02

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp (windows (iscope:eqversion:08-10-02

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:08-10-01

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp (windows (iscope:eqversion:08-10-01

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:08-00-04

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:08-00-03

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp (windows (iscope:eqversion:08-00-03

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:08-00-02

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp (windows (iscope:eqversion:08-00-02

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:08-00-01

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp (windows (iscope:eqversion:08-00-01

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp (windows (escope:eqversion:08-00-01

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp (windows (englscope:eqversion:08-00

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:07-50-05

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:07-50-04

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:07-50-03

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:07-50-02

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:07-50-01

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:07-50

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp (windows (englscope:eqversion:07-50

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 07-10-/cscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 07-10-/bscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 07-10-/ascope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp (windows (englscope:eqversion:07-10

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 07-00-/escope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 07-00-/dscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 07-00-/cscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 07-00-/bscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 07-00-/ascope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:07-00

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp (windows (englscope:eqversion:07-00

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 06-01-/hscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 06-01-/gscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 06-01-/fscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 06-01-/escope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 06-01-/dscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 06-01-/cscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 06-01-/bscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 06-01-/ascope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:06-01

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 06-00-/dscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 06-00-/cscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 06-00-/bscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 06-00-/a (windows (escope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp (windows (englscope:eqversion:06-00

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 05-20-/cscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 05-20-/bscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 05-20-/ascope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:05-20

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp (windows (englscope:eqversion:05-20

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 05-10-/dscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 05-10-/cscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 05-10-/bscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 05-10-/ascope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:05-10

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 05-02-/ascope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftpscope:eqversion:05-02

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 05-00-/bscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 02-00-/b (windows (escope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 02-00-/a (windows (escope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp (windows (englscope:eqversion:02-00

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp (windows (englscope:eqversion:01-03

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 01-00-/bscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 01-00-/ascope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftpscope:neversion:08-10-03

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp (windows(ipscope:neversion:08-10-03

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftpscope:neversion:07-50-06

Trust: 0.3

vendor:hitachimodel:jp1/file transmission server/ftp 07-10-/a (windows(ipscope:neversion: -

Trust: 0.3

sources: BID: 26542 // JVNDB: JVNDB-2007-001000 // CNNVD: CNNVD-200711-379 // NVD: CVE-2007-6146

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-6146
value: MEDIUM

Trust: 1.0

IPA: JVNDB-2007-001000
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200711-379
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2007-6146
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

IPA: JVNDB-2007-001000
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

sources: JVNDB: JVNDB-2007-001000 // CNNVD: CNNVD-200711-379 // NVD: CVE-2007-6146

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.8

sources: JVNDB: JVNDB-2007-001000 // NVD: CVE-2007-6146

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200711-379

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-200711-379

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-001000

PATCH

title:HS07-038url:http://www.hitachi-support.com/security_e/vuls_e/HS07-038_e/index-e.html

Trust: 0.8

sources: JVNDB: JVNDB-2007-001000

EXTERNAL IDS

db:NVDid:CVE-2007-6146

Trust: 2.7

db:BIDid:26542

Trust: 2.7

db:SECUNIAid:27735

Trust: 2.6

db:HITACHIid:HS07-038

Trust: 2.0

db:OSVDBid:42354

Trust: 1.6

db:VUPENid:ADV-2007-3957

Trust: 1.6

db:JVNDBid:JVNDB-2007-001000

Trust: 0.8

db:CNNVDid:CNNVD-200711-379

Trust: 0.6

db:HITACHIid:HS07-037

Trust: 0.1

db:PACKETSTORMid:61096

Trust: 0.1

sources: BID: 26542 // JVNDB: JVNDB-2007-001000 // PACKETSTORM: 61096 // CNNVD: CNNVD-200711-379 // NVD: CVE-2007-6146

REFERENCES

url:http://secunia.com/advisories/27735

Trust: 2.4

url:http://www.securityfocus.com/bid/26542

Trust: 2.4

url:http://www.hitachi-support.com/security_e/vuls_e/hs07-038_e/index-e.html

Trust: 2.0

url:http://osvdb.org/42354

Trust: 1.6

url:http://www.frsirt.com/english/advisories/2007/3957

Trust: 1.4

url:http://www.vupen.com/english/advisories/2007/3957

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-6146

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-6146

Trust: 0.8

url:http://www.hds.com/products/storage-software/hitachi-device-manager.html

Trust: 0.3

url:http://www.hitachi.co.jp/prod/comp/soft1/global/prod/jp1/

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://www.hitachi-support.com/security_e/vuls_e/hs07-037_e/index-e.html

Trust: 0.1

url:http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/3821/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/advisories/27735/

Trust: 0.1

sources: BID: 26542 // JVNDB: JVNDB-2007-001000 // PACKETSTORM: 61096 // CNNVD: CNNVD-200711-379 // NVD: CVE-2007-6146

CREDITS

The vendor disclosed this issue.

Trust: 0.9

sources: BID: 26542 // CNNVD: CNNVD-200711-379

SOURCES

db:BIDid:26542
db:JVNDBid:JVNDB-2007-001000
db:PACKETSTORMid:61096
db:CNNVDid:CNNVD-200711-379
db:NVDid:CVE-2007-6146

LAST UPDATE DATE

2025-04-10T22:57:27.222000+00:00


SOURCES UPDATE DATE

db:BIDid:26542date:2015-05-07T17:34:00
db:JVNDBid:JVNDB-2007-001000date:2008-05-21T00:00:00
db:CNNVDid:CNNVD-200711-379date:2007-11-28T00:00:00
db:NVDid:CVE-2007-6146date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:BIDid:26542date:2007-11-22T00:00:00
db:JVNDBid:JVNDB-2007-001000date:2008-05-21T00:00:00
db:PACKETSTORMid:61096date:2007-11-26T16:56:43
db:CNNVDid:CNNVD-200711-379date:2007-11-27T00:00:00
db:NVDid:CVE-2007-6146date:2007-11-27T19:46:00