Hitachi NetInsight II Port Discovery Service Malformed Format Data DoS
2006-01-20T07:48:15
ID OSVDB:22676 Type osvdb Reporter OSVDB Modified 2006-01-20T07:48:15
Description
Vulnerability Description
NetInsight II contains a flaw that may allow a local denial of service. The issue is triggered when the Port Discovery service receives malformed data packets, and will result in loss of availability for the service.
Solution Description
Upgrade to version 07-50-01 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.
Short Description
NetInsight II contains a flaw that may allow a local denial of service. The issue is triggered when the Port Discovery service receives malformed data packets, and will result in loss of availability for the service.
{"type": "osvdb", "published": "2006-01-20T07:48:15", "href": "https://vulners.com/osvdb/OSVDB:22676", "bulletinFamily": "software", "cvss": {"vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/", "score": 5.0}, "viewCount": 0, "edition": 1, "reporter": "OSVDB", "title": "Hitachi NetInsight II Port Discovery Service Malformed Format Data DoS", "affectedSoftware": [{"operator": "eq", "version": "Standard 07-07", "name": "JP1/NetInsight II - Port Discovery"}, {"operator": "eq", "version": "Standard 07-11", "name": "JP1/NetInsight II - Port Discovery"}, {"operator": "eq", "version": "Standard 07-09", "name": "JP1/NetInsight II - Port Discovery"}, {"operator": "eq", "version": "Standard 07-08", "name": "JP1/NetInsight II - Port Discovery"}, {"operator": "eq", "version": "Standard 07-06", "name": "JP1/NetInsight II - Port Discovery"}, {"operator": "eq", "version": "Standard 07-04", "name": "JP1/NetInsight II - Port Discovery"}, {"operator": "eq", "version": "Standard 07-05", "name": "JP1/NetInsight II - Port Discovery"}, {"operator": "eq", "version": "Standard 07-01", "name": "JP1/NetInsight II - Port Discovery"}, {"operator": "eq", "version": "Standard 07-00", "name": "JP1/NetInsight II - Port Discovery"}, {"operator": "eq", "version": "Advance 07-50", "name": "JP1/NetInsight II - Port Discovery"}, {"operator": "eq", "version": "Standard 07-10", "name": "JP1/NetInsight II - Port Discovery"}, {"operator": "eq", "version": "Standard 07-02", "name": "JP1/NetInsight II - Port Discovery"}, {"operator": "eq", "version": "Standard 07-03", "name": "JP1/NetInsight II - Port Discovery"}], "enchantments": {"score": {"value": 4.8, "vector": "NONE", "modified": "2017-04-28T13:20:19", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2006-0343"]}], "modified": "2017-04-28T13:20:19", "rev": 2}, "vulnersScore": 4.8}, "references": [], "id": "OSVDB:22676", "lastseen": "2017-04-28T13:20:19", "cvelist": ["CVE-2006-0343"], "modified": "2006-01-20T07:48:15", "description": "## Vulnerability Description\nNetInsight II contains a flaw that may allow a local denial of service. The issue is triggered when the Port Discovery service receives malformed data packets, and will result in loss of availability for the service.\n## Solution Description\nUpgrade to version 07-50-01 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## Short Description\nNetInsight II contains a flaw that may allow a local denial of service. The issue is triggered when the Port Discovery service receives malformed data packets, and will result in loss of availability for the service.\n## References:\n[Vendor Specific Advisory URL](http://www.hitachi-support.com/security_e/vuls_e/HS05-027_e/index-e.html)\nSecurity Tracker: 1015520\n[Secunia Advisory ID:18538](https://secuniaresearch.flexerasoftware.com/advisories/18538/)\nKeyword: HS05-027\nFrSIRT Advisory: ADV-2006-0267\n[CVE-2006-0343](https://vulners.com/cve/CVE-2006-0343)\nBugtraq ID: 16327\n"}
{"cve": [{"lastseen": "2020-10-03T11:48:12", "description": "Unspecified vulnerability in the Port Discovery Standard and Advanced features in Hitachi JP1/NetInsight II allows attackers to stop the Port Discovery service via unknown vectors involving \"invalid format data\".", "edition": 3, "cvss3": {}, "published": "2006-01-21T00:03:00", "title": "CVE-2006-0343", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2006-0343"], "modified": "2017-07-20T01:29:00", "cpe": ["cpe:/a:hitachi:jpi_netsight_ii_port_discovery_standard:r_15237_9164_07_07", "cpe:/a:hitachi:jpi_netsight_ii_port_discovery_standard:r_15237_9164_07_03", "cpe:/a:hitachi:jpi_netsight_ii_port_discovery_standard:r_15237_9164_07_06", "cpe:/a:hitachi:jpi_netsight_ii_port_discovery_standard:r_15237_9164_07_00", "cpe:/a:hitachi:jpi_netsight_ii_port_discovery_standard:r_15237_9164_07_11", "cpe:/a:hitachi:jpi_netsight_ii_port_discovery_advance:r_15237_9154_07_50", "cpe:/a:hitachi:jpi_netsight_ii_port_discovery_standard:r_15237_9164_07_02", "cpe:/a:hitachi:jpi_netsight_ii_port_discovery_standard:r_15237_9164_07_09", "cpe:/a:hitachi:jpi_netsight_ii_port_discovery_standard:r_15237_9164_07_01", "cpe:/a:hitachi:jpi_netsight_ii_port_discovery_standard:r_15237_9164_07_10", "cpe:/a:hitachi:jpi_netsight_ii_port_discovery_standard:r_15237_9164_07_05", "cpe:/a:hitachi:jpi_netsight_ii_port_discovery_standard:r_15237_9164_07_04", "cpe:/a:hitachi:jpi_netsight_ii_port_discovery_standard:r_15237_9164_07_08"], "id": "CVE-2006-0343", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-0343", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:hitachi:jpi_netsight_ii_port_discovery_advance:r_15237_9154_07_50:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:jpi_netsight_ii_port_discovery_standard:r_15237_9164_07_09:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:jpi_netsight_ii_port_discovery_standard:r_15237_9164_07_01:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:jpi_netsight_ii_port_discovery_standard:r_15237_9164_07_05:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:jpi_netsight_ii_port_discovery_standard:r_15237_9164_07_00:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:jpi_netsight_ii_port_discovery_standard:r_15237_9164_07_02:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:jpi_netsight_ii_port_discovery_standard:r_15237_9164_07_11:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:jpi_netsight_ii_port_discovery_standard:r_15237_9164_07_10:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:jpi_netsight_ii_port_discovery_standard:r_15237_9164_07_07:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:jpi_netsight_ii_port_discovery_standard:r_15237_9164_07_06:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:jpi_netsight_ii_port_discovery_standard:r_15237_9164_07_08:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:jpi_netsight_ii_port_discovery_standard:r_15237_9164_07_03:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:jpi_netsight_ii_port_discovery_standard:r_15237_9164_07_04:*:*:*:*:*:*:*"]}]}