A vulnerability to Denial of Service (DoS) attacks was found in XMAP3.
Vulnerability ID
HS08-011
Vulnerability description
If the XMAP3 printing service receives unexpected data, the printing service might be disrupted temporarily. However the printing service will restart automatically in 5 seconds.
Affected products and versions are listed below. Please upgrade to the appropriate version.
Affected products
The information is organized under the following headings:
(Example)
Product name: Gives the name of the affected product.
Version:
- Platform
- Gives the affected version.
Product name: XMAP3 Server
Version(s):
- AIX
- 04-00 to 04-07-/A
- HP-UX(PA-RISC)
- 04-01 to 04-06-/A
- HP-UX(IPF)
- 04-05 to 04-05-/A
- Solaris
- 04-01 to 04-04-/A(*1)
Product name: XMAP3/NET
Version(s):
- Windows
- 01-00 to 02-01-/B(*1), 02-02 to 02-04-/D(*1), 03-00 to 03-06-/G
Product name: XMAP3/NET Version 4
Version(s):
- Windows
- 04-00 to 04-10
Product name: XMAP3/NET-RTS
Version(s):
- Windows
- 01-00 to 02-01-/B(*1), 02-02 to 02-04-/A(*1)
Product name: XMAP3/NET Run Time System
Version(s):
- Windows
- 02-02 to 02-04-/D(*1), 03-00 to 03-06-/G
Product name: XMAP3/NET Run Time System Version 4
Version(s):
- Windows
- 04-00 to 04-10-/B
Product name: XMAP3/WIDE
Version(s):
- Windows
- 02-01 to 02-04-/D(*1), 03-00 to 03-06-/G
Product name: XMAP3/WIDE Run Time System
Version(s):
- Windows
- 02-01 to 02-04-/D(*1), 03-00 to 03-06-/G
Product name: XMAP3/Web - Design
Version(s):
- Windows
- 03-03 to 03-06-/G
Product name: XMAP3/Enterprise Edition
Version(s):
- Windows
- 03-02 to 03-06-/G
Product name: XMAP3/Enterprise Edition Version 4
Version(s):
- Windows
- 04-00 to 04-10
Product name: XMAP3/Enterprise Edition Run Time System Version 4
Version(s):
- Windows
- 04-00 to 04-10-/B
- *1
- For details about this version, contact your Hitachi support service representative.
Fixed products
The information is organized under the following headings:
(Example)
Product name: Gives the name of the fixed product.
Version:
- Platform
- Gives the fixed version, and release date.
Scheduled version(s):
- Platform
- Gives the fixed version scheduled to be released.
Product name: XMAP3 Server
Version(s):
- AIX
- 04-07-/B February 7, 2008
- HP-UX(PA-RISC)
- 04-06-/B March 12, 2008
- HP-UX(IPF)
- 04-05-/B April 23, 2008
Product name: XMAP3/NET
Version(s):
- Windows
- 03-06-/H July 17, 2008
Product name: XMAP3/NET Version 4
Version(s):
- Windows
- 04-10-/C January 15, 2008
Product name: XMAP3/NET Run Time System
Version(s):
- Windows
- 03-06-/H July 17, 2008
Product name: XMAP3/NET Run Time System Version 4
Version(s):
- Windows
- 04-10-/C January 15, 2008
Product name: XMAP3/WIDE
Version(s):
- Windows
- 03-06-/H July 17, 2008
Product name: XMAP3/WIDE Run Time System
Version(s):
- Windows
- 03-06-/H July 17, 2008
Product name: XMAP3/Web - Design
Version(s):
- Windows
- 03-06-/H July 17, 2008
Product name: XMAP3/Enterprise Edition
Version(s):
- Windows
- 03-06-/H July 17, 2008
Product name: XMAP3/Enterprise Edition Version 4
Version(s):
- Windows
- 04-10-/C January 15, 2008
Product name: XMAP3/Enterprise Edition Run Time System Version 4
Version(s):
- Windows
- 04-10-/C January 15, 2008
For details on the fixed products, contact your Hitachi support service representative.
Workarounds
Please perform the following workaround until a fixed module is available:
- If you do not use the printing service, change the settings so the printing service does not start, and then restart the XMAP3 server or XMAP client.
- If you use the printing service on a Windows server machine in a client-server system, specify the stand-alone setting for the printing service.
- Set filtering rules on the OS or router so that only reliable IP addresses can access the TCP ports used by XMAP3.
Revision history
- July 25, 2008
- Information about fixed products is updated.
- May 30, 2008
- This page is released.
- Hitachi, Ltd. (hereinafter referred to as "Hitachi") tries to provide accurate information about security countermeasures. However, since information about security problems constantly changes, the contents of these Web pages are subject to change without prior notice. When referencing information, please confirm that you are referencing the latest information.
- The Web pages include information about products that are developed by non-Hitachi software developers. Vulnerability information about those products is based on the information provided or disclosed by those developers. Although Hitachi is careful about the accuracy and completeness of this information, the contents of the Web pages may change depending on the changes made by the developers.
- The Web pages are intended to provide vulnerability information only, and Hitachi shall not have any legal responsibility for the information contained in them. Hitachi shall not be liable for any consequences arising out of or in connection with the security countermeasures or other actions that you will take or have taken (or not taken) by yourself.
- The links to other web sites are valid at the time of the release of the page. Although Hitachi makes an effort to maintain the links, Hitachi cannot guarantee their permanent availability.