Malware Devil

Monday, November 2, 2020

ESB-2020.3771 – [Win][Linux][AIX] Hitachi Products: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.3771
                 Hitachi Products Multiple Vulnerabilities
                              2 November 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Hitachi Products
Publisher:         Hitachi
Operating System:  Windows
                   Linux variants
                   AIX
Impact/Access:     Modify Arbitrary Files   -- Remote/Unauthenticated
                   Denial of Service        -- Remote/Unauthenticated
                   Access Confidential Data -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-14803 CVE-2020-14798 CVE-2020-14797
                   CVE-2020-14796 CVE-2020-14792 CVE-2020-14782
                   CVE-2020-14781 CVE-2020-14779 

Reference:         ASB-2020.0175
                   ESB-2020.3664

Original Bulletin: 
   https://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2020-133/index.html
   https://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2020-134/index.html

Comment: This bulletin contains two (2) Hitachi security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

Multiple vulnerabilities have been found in Cosminexus.

Security Information ID
hitachi-sec-2020-133


Vulnerability description
Cosminexus Developer's Kit for Java(TM) and Hitachi Developer's Kit for Java contain the following vulnerabilities:

CVE-2020-14779, CVE-2020-14781, CVE-2020-14782, CVE-2020-14792, CVE-2020-14796, CVE-2020-14797, CVE-2020-14798, CVE-2020-14803

Affected products and versions are listed below. Please upgrade your version to the appropriate version.
These vulnerabilities exist in Cosminexus Developer's Kit for Java(TM) and Hitachi Developer's Kit for Java which is a component product of other Hitachi products.
For details about the fixed version about Cosminexus products, contact your Hitachi support service representative.


Affected products

- - Cosminexus V11

Product name: uCosminexus Application Server
Product name: uCosminexus Application Server(64)
Product name: uCosminexus Client
Product name: uCosminexus Developer
Product name: uCosminexus Service Architect
Product name: uCosminexus Service Platform
Product name: uCosminexus Service Platform(64)
Version(s):

Windows 11-00
Linux 11-00
AIX 11-00


- - Cosminexus V9

Product name: uCosminexus Application Server
Product name: uCosminexus Application Server(64)
Product name: uCosminexus Client
Product name: uCosminexus Developer
Product name: uCosminexus Service Architect
Product name: uCosminexus Service Platform
Product name: uCosminexus Service Platform(64)
Version(s):

Windows 09-60 to 09-70
Windows(x64) 09-60 to 09-87
Linux(x64) 09-60 to 09-87
AIX 09-60 to 09-70


- - Hitachi Application Server

Product name: Hitachi Application Server
Product name: Hitachi Application Server for Developers

Version(s):

Windows 10-10
Windows(x64) 10-10 to 10-11
Linux(x64) 10-11


Fixed products
Product name: Cosminexus Developer's Kit for Java(TM)
Product name: Hitachi Developer's Kit for Java


Revision history
October 30, 2020 This page is released.

- ------------------------------------------------------------------------------

Multiple vulnerabilities have been found in Hitachi Command Suite, Hitachi Automation Director, Hitachi Configuration Manager, Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center.

Security Information ID
hitachi-sec-2020-134

Vulnerability description
Multiple vulnerabilities have been found in Hitachi Command Suite, Hitachi Automation Director, Hitachi Configuration Manager, Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center.

CVE-2020-14779, CVE-2020-14781, CVE-2020-14782, CVE-2020-14792, CVE-2020-14796, CVE-2020-14797, CVE-2020-14798, CVE-2020-14803

Affected products and versions are listed below. Please upgrade your version to the appropriate version, or apply the Workarounds.

The product name in Hitachi Command Suite is changed in Hitachi Ops Center series on some products. To find fixed products, need to find same number following product name in [Affected products] and [Fixed products].


Affected products
Product name: Hitachi Device Manager ---(1)
Component name: Device Manager Server
Version(s):

All versions

Product name: Hitachi Device Manager ---(1)
Component name: Device Manager Agent
Version(s):

All versions

Product name: Hitachi Device Manager ---(1)
Component name: Host Data Collector
Version(s):

All versions

Product name: Hitachi Tiered Storage Manager ---(2)
Version(s):

All versions

Product name: Hitachi Replication Manager ---(3)
Version(s):

All versions

Product name: Hitachi Tuning Manager ---(4)
Component name: Hitachi Tuning Manager server
Version(s):

All versions

Product name: Hitachi Tuning Manager ---(4)
Component name: Hitachi Tuning Manager - Agent for RAID
Version(s):

8.0.0-00 or more

Product name: Hitachi Tuning Manager ---(4)
Component name: Hitachi Tuning Manager - Agent for NAS
Version(s):

8.0.0-00 or more

Product name: Hitachi Tuning Manager ---(4)
Component name: Hitachi Tuning Manager - Agent for SAN Switch

Version(s):

All versions

Product name: Hitachi Dynamic Link Manager ---(5)
Version(s):

All versions

Product name: Hitachi Global Link Manager ---(6)
Version(s):

All versions

Product name: Hitachi Compute Systems Manager ---(7)
Version(s):

All versions

Product name: Hitachi Automation Director ---(8)
Version(s):

All versions

Product name: Hitachi Configuration Manager ---(9)
Version(s):

All versions

Product name: Hitachi Infrastructure Analytics Advisor ---(10)
Component name: Hitachi Infrastructure Analytics Advisor
Version(s):

All versions

Product name: Hitachi Infrastructure Analytics Advisor ---(10)
Component name: Analytics probe server
Version(s):

All versions

- - Hitachi Ops Center

Product name: Hitachi Ops Center Automator ---(8)
Version(s):

All versions

Product name: Hitachi Ops Center API Configuration Manager ---(9)
Version(s):

All versions

Product name: Hitachi Ops Center Analyzer ---(10)
Version(s):

All versions

Product name: Hitachi Ops Center Analyzer viewpoint ---(11)
Version(s):

All versions

Product name: Hitachi Ops Center Common Services ---(12)
Version(s):

All versions


Fixed products

- - Hitachi Command Suite

Product name: Hitachi Device Manager ---(1)
Scheduled version(s):

Product name: Hitachi Tiered Storage Manager ---(2)
Scheduled version(s):

Product name: Hitachi Replication Manager ---(3)
Scheduled version(s):

Product name: Hitachi Tuning Manager ---(4)
Scheduled version(s):

Product name: Hitachi Dynamic Link Manager ---(5)
Scheduled version(s):

Product name: Hitachi Global Link Manager ---(6)
Scheduled version(s):

Product name: Hitachi Compute Systems Manager ---(7)
Scheduled version(s):

Product name: Hitachi Automation Director ---(8)
Scheduled version(s):

Product name: Hitachi Configuration Manager ---(9)
Scheduled version(s):

- - Hitachi Ops Center

Product name: Hitachi Ops Center Automator ---(8)
Scheduled version(s):

Product name: Hitachi Ops Center API Configuration Manager ---(9)
Scheduled version(s):

Product name: Hitachi Ops Center Analyzer ---(10)
Scheduled version(s):

Product name: Hitachi Ops Center Analyzer viewpoint ---(11)
Scheduled version(s):

Product name: Hitachi Ops Center Common Services ---(12)
Scheduled version(s):

For details on the fixed products, contact your Hitachi support service representative.

Workarounds

Hitachi Command Suite, Hitachi Infrastructure Analytics Advisor, Hitachi Automation Director, Hitachi Configuration Manager, Hitachi Ops Center Analyzer, Hitachi Ops Center Automator and Hitachi Ops Center API Configuration Manager
None

If you have support agreement with Oracle Java, execute the following temporary solution. Change the JDK used by Hitachi Command Suite products to the Oracle JDK(8u271 or later).
For details about precondition and procedure, see product documents.(*1)

Hitachi Ops Center Analyzer viewpoint
Change the JDK used by Hitachi Ops Center Analyzer viewpoint to the Amazon Corretto(11.0.9).
For details on the procedure, see Installation and Configuration Guide.

Hitachi Ops Center Common Services
Change the JDK used by Hitachi Ops Center Common Services to the Amazon Corretto(8.272).
For details on the procedure, see Installation and Configuration Guide.

*1About Hitachi Infrastructure Analytics Advisor (including Analytics probe) and Hitachi Ops Center Analyzer (including Analyzer probe), contact your Hitachi support service representative.

Revision history
October 30, 2020 This page is released.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=5BSc
-----END PGP SIGNATURE-----

Read More

The post ESB-2020.3771 – [Win][Linux][AIX] Hitachi Products: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2020/11/02/esb-2020-3771-winlinuxaix-hitachi-products-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2020-3771-winlinuxaix-hitachi-products-multiple-vulnerabilities

No comments:

Post a Comment

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...