Update: September 30, 2013
By sending request messages from an unexpected host, malicious users can execute arbitrary commands via Vulnerability in JP1/Automatic Job Management System 3 and JP1/Automatic Job Management System 2 (abbreviated as JP1/AJS3 and JP1/AJS2 hereafter).
Vulnerability ID
HS13-023
Vulnerability description
When Vulnerability in JP1/AJS3 and JP1/AJS2 receive messages from an unexpected host, malicious users can execute arbitrary commands. As a measure against this vulnerability, fixed versions of Vulnerability in JP1/AJS3 and JP1/AJS2 have a functionality allowing connection only from specified hosts.
Affected products and versions are listed below. Please upgrade your version to the appropriate version, or apply the Workarounds.
Affected products
The information is organized under the following headings:
(Example)
Product name: Gives the name of the affected product.
Version:
- Platform
- Gives the affected version.
Product name: JP1/Automatic Job Management System 3 - Manager
Version(s):
- Windows Server 2008, Windows Server 2003
- 09-00 to 10-00
- Windows Server 2008(IPF), Windows Server 2003(IPF)
- 09-00 to 09-50
- HP-UX(IPF)
- 09-00 to 10-00
- AIX
- 09-00 to 10-00
- Solaris(SPARC)
- 09-00 to 10-00
- RHEL 5, RHEL 5(IPF)
- 09-00 to 09-50
- RHEL 6
- 09-50 to 10-00
Product name: JP1/Automatic Job Management System 3 - Agent
Version(s):
- Windows Server 2008, Windows Server 2003
- 09-00 to 10-00
- Windows Server 2008(IPF), Windows Server 2003(IPF)
- 09-00 to 09-50
- HP-UX(IPF)
- 09-00 to 10-00
- AIX
- 09-00 to 10-00
- Solaris(x86), Solaris(SPARC)
- 09-00 to 10-00
- RHEL 5, RHEL 5(IPF)
- 09-00 to 09-50
- RHEL 6
- 09-50 to 10-00
Product name: JP1/Automatic Job Management System 2 - Manager
Version(s):
- Windows Server 2008, Windows Server 2008(IPF)
- 08-50
- Windows Server 2003
- 07-00 to 08-50
- Windows Server 2003(IPF)
- 07-10 to 08-50
- Windows
- 06-00 to 08-50
- HP-UX(PA-RISC)
- 06-00 to 08-50
- HP-UX(IPF)
- 07-10 to 08-50
- AIX
- 06-00 to 08-50
- Solaris(SPARC)
- 06-00 to 08-50
- RHEL 5, RHEL 5(IPF)
- 08-50
- RHEL AS 4 / ES 4, RHEL AS 4(IPF)
- 08-00 to 08-50
- RHEL AS 3 / ES 3, RHEL AS 3(IPF)
- 07-10 to 07-50
- RHEL
- 07-10 to 07-50
- HP Tru64 UNIX
- 06-00 to 06-71
Product name: JP1/Automatic Job Management System 2 - Agent
Version(s):
- Windows Server 2008, Windows Server 2008(IPF)
- 08-50
- Windows Server 2003, Windows Server 2003(IPF)
- 07-00 to 08-50
- Windows
- 06-00 to 08-50
- HP-UX(PA-RISC)
- 06-00 to 08-50
- HP-UX(IPF)
- 07-00 to 08-50
- AIX
- 06-00 to 08-50
- Solaris 10
- 08-50
- Solaris(SPARC)
- 06-00 to 08-50
- RHEL 5, RHEL 5(IPF)
- 08-50
- RHEL AS 4 / ES 4, RHEL AS 4(IPF)
- 08-00 to 08-50
- RHEL AS 3 / ES 3, RHEL AS 3(IPF)
- 07-10 to 07-50
- RHEL
- 06-00 to 07-50
- zLinux
- 07-00 to 08-50
- HP Tru64 UNIX
- 06-00 to 07-11
- HI-UX/WE2
- 06-00 to 06-51
Product name: JP1/Automatic Job Management System 2 - Light Edition
Version(s):
- Windows Server 2003
- 07-00 to 07-50
- Windows
- 06-00 to 07-50
- HP-UX(PA-RISC), AIX, Solaris(SPARC), HP Tru64 UNIX
- 06-00 to 06-71
Fixed products
The information is organized under the following headings:
(Example)
Product name: Gives the name of the fixed product.
Version:
- Platform
- Gives the fixed version, and release date.
Scheduled version:
- Platform
- Gives the fixed version scheduled to be released.
Product name: JP1/Automatic Job Management System 3 - Manager
Version(s):
- Windows Server 2008
- 10-10 September 30, 2013
- Windows Server 2003
- 10-10 September 30, 2013
- HP-UX(IPF)
- 10-10 September 30, 2013
- Solaris
- 10-10 September 30, 2013
- AIX
- 10-10 September 30, 2013
- RHEL 5, RHEL 6
- 10-10 September 30, 2013
Product name: JP1/Automatic Job Management System 3 - Agent
Version(s):
- Windows Server 2008
- 10-10 September 30, 2013
- Windows Server 2003
- 10-10 September 30, 2013
- HP-UX(IPF)
- 10-10 September 30, 2013
- Solaris
- 10-10 September 30, 2013
- AIX
- 10-10 September 30, 2013
- RHEL 5, RHEL 6
- 10-10 September 30, 2013
For details on the fixed products, contact your Hitachi support service representative.
Workarounds
For details about the workarounds, contact your Hitachi support service representative.
Revision history
- September 30, 2013
- This page is released.
- Hitachi, Ltd. (hereinafter referred to as "Hitachi") tries to provide accurate information about security countermeasures. However, since information about security problems constantly changes, the contents of these Web pages are subject to change without prior notice. When referencing information, please confirm that you are referencing the latest information.
- The Web pages include information about products that are developed by non-Hitachi software developers. Vulnerability information about those products is based on the information provided or disclosed by those developers. Although Hitachi is careful about the accuracy and completeness of this information, the contents of the Web pages may change depending on the changes made by the developers.
- The Web pages are intended to provide vulnerability information only, and Hitachi shall not have any legal responsibility for the information contained in them. Hitachi shall not be liable for any consequences arising out of or in connection with the security countermeasures or other actions that you will take or have taken (or not taken) by yourself.
- The links to other web sites are valid at the time of the release of the page. Although Hitachi makes an effort to maintain the links, Hitachi cannot guarantee their permanent availability.