ID

VAR-201001-0938


TITLE

Hitachi Multiple Products Image File Parsing Buffer Overflow Vulnerability

Trust: 0.3

sources: BID: 38000

DESCRIPTION

Multiple Hitachi products, including Cosminexus, Processing Kit for XML, and Hitachi Developer's Kit for Java, are prone to a buffer-overflow vulnerability because the software fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer. Attackers can execute arbitrary code in the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. ---------------------------------------------------------------------- Secunia integrated with Microsoft WSUS http://secunia.com/blog/71/ ---------------------------------------------------------------------- TITLE: Hitachi Products Image File Processing Buffer Overflow SECUNIA ADVISORY ID: SA38363 VERIFY ADVISORY: http://secunia.com/advisories/38363/ DESCRIPTION: A vulnerability has been reported in multiple Hitachi products, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. The vulnerability is caused due to an unspecified error when processing image files in Java applications and can be exploited to cause a buffer overflow. Please see the vendor's advisory for a full list of affected products. SOLUTION: Update to a fixed version. See vendor advisory for details. PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: Hitachi: http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS09-019/index.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 0.36

sources: BID: 38000 // PACKETSTORM: 85770

AFFECTED PRODUCTS

vendor:hitachimodel:ucosminexus/opentp1 web front-end setscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:ucosminexus service platformscope:eqversion:8

Trust: 0.3

vendor:hitachimodel:ucosminexus service platformscope:eqversion:7

Trust: 0.3

vendor:hitachimodel:ucosminexus service platformscope:eqversion:6.7

Trust: 0.3

vendor:hitachimodel:ucosminexus service architectscope:eqversion:8

Trust: 0.3

vendor:hitachimodel:ucosminexus service architectscope:eqversion:7

Trust: 0.3

vendor:hitachimodel:ucosminexus service architectscope:eqversion:6.7

Trust: 0.3

vendor:hitachimodel:ucosminexus portal framework entry setscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:ucosminexus operatorscope:eqversion:8

Trust: 0.3

vendor:hitachimodel:ucosminexus operatorscope:eqversion:7

Trust: 0.3

vendor:hitachimodel:ucosminexus operatorscope:eqversion:6.7

Trust: 0.3

vendor:hitachimodel:ucosminexus navigation platform authoring licensescope:eqversion:0

Trust: 0.3

vendor:hitachimodel:ucosminexus navigation platform user licensescope:eqversion:-0

Trust: 0.3

vendor:hitachimodel:ucosminexus navigation platformscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:ucosminexus navigation developerscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standardscope:eqversion:8

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standardscope:eqversion:7

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standardscope:eqversion:6.7

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standardscope:eqversion:6

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professionalscope:eqversion:8

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professionalscope:eqversion:7

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professionalscope:eqversion:6.7

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professionalscope:eqversion:6

Trust: 0.3

vendor:hitachimodel:ucosminexus developer lightscope:eqversion:8

Trust: 0.3

vendor:hitachimodel:ucosminexus developer lightscope:eqversion:7

Trust: 0.3

vendor:hitachimodel:ucosminexus developer lightscope:eqversion:6.7

Trust: 0.3

vendor:hitachimodel:ucosminexus collaboration serverscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:ucosminexus clientscope:eqversion:8

Trust: 0.3

vendor:hitachimodel:ucosminexus clientscope:eqversion:7

Trust: 0.3

vendor:hitachimodel:ucosminexus clientscope:eqversion:6.7

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standard versionscope:eqversion:6

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standardscope:eqversion:8

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standardscope:eqversion:7

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standardscope:eqversion:6.7

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprise versionscope:eqversion:6

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:8

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:7

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:6.7

Trust: 0.3

vendor:hitachimodel:groupmax collaboration serverscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:electronic form workflow standard setscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:electronic form workflow setscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:electronic form workflow professional setscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:electronic form workflow professional library setscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:electronic form workflow developer setscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:electronic form workflow developer client setscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:cosminexus studio web editionscope:eqversion:4

Trust: 0.3

vendor:hitachimodel:cosminexus studio standard editionscope:eqversion:4

Trust: 0.3

vendor:hitachimodel:cosminexus studioscope:eqversion:5

Trust: 0.3

vendor:hitachimodel:cosminexus server web editionscope:eqversion:4

Trust: 0.3

vendor:hitachimodel:cosminexus server standard editionscope:eqversion:4

Trust: 0.3

vendor:hitachimodel:cosminexus developer lightscope:eqversion:6

Trust: 0.3

vendor:hitachimodel:cosminexus developerscope:eqversion:5

Trust: 0.3

vendor:hitachimodel:cosminexus clientscope:eqversion:6

Trust: 0.3

vendor:hitachimodel:cosminexus application serverscope:eqversion:5.0

Trust: 0.3

sources: BID: 38000

THREAT TYPE

network

Trust: 0.3

sources: BID: 38000

TYPE

Boundary Condition Error

Trust: 0.3

sources: BID: 38000

EXTERNAL IDS

db:HITACHIid:HS09-019

Trust: 0.4

db:BIDid:38000

Trust: 0.3

db:SECUNIAid:38363

Trust: 0.2

db:PACKETSTORMid:85770

Trust: 0.1

sources: BID: 38000 // PACKETSTORM: 85770

REFERENCES

url:http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs09-019/index.html

Trust: 0.4

url:http://www.hitachi.com/index.html

Trust: 0.3

url:http://www.hitachi.co.jp/prod/comp/soft1/groupmax/product/suiteindex.html#coll

Trust: 0.3

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/blog/71/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/38363/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: BID: 38000 // PACKETSTORM: 85770

CREDITS

The issue is reported by the vendor.

Trust: 0.3

sources: BID: 38000

SOURCES

db:BIDid:38000
db:PACKETSTORMid:85770

LAST UPDATE DATE

2022-05-17T22:44:35.420000+00:00


SOURCES UPDATE DATE

db:BIDid:38000date:2010-01-29T00:00:00

SOURCES RELEASE DATE

db:BIDid:38000date:2010-01-29T00:00:00
db:PACKETSTORMid:85770date:2010-01-31T10:11:37