2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2010-2625" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2010-07-02T20:30:01.833" ,
2024-11-22 11:14:00 +00:00
"lastModified" : "2024-11-21T01:17:01.887" ,
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Unspecified vulnerability in the Client Service for DPM in Hitachi ServerConductor / Deployment Manager 01-00, 01-01, and 06-00 through 06-00-/A; ServerConductor / Deployment Manager Standard Edition and Enterprise Edition 07-50 through 07-55, and 07-57 through 07-59; and JP1/ServerConductor/Deployment Manager Standard and Enterprise Edition 07-50 through 07-56-/F, 08-00 through 08-09-/E, 08-50 through 08-80-/A, 08-06 through 08-07, and 08-51 through 08-70; allows attackers to cause a denial of service (shutdown and reboot) via unknown vectors."
} ,
{
"lang" : "es" ,
"value" : "Una vulnerabilidad no especificadda en el Servicio de cliente para el DPM en ServerConductor/Deployment Manager v01-00, v01-01 y v06-00 a v06-00-/A de Hitachi; ServerConductor/Deployment Manager Standard Edition y Enterprise Edition v07-50, v07-55 y v07-57 a v07-59; y JP1/ServerConductor/Deployment Manager Standard y Enterprise Edition v07-50 a v07-56-/F, v08-00, v08-09-/E, v08-50 a v08-80-/A, v08-06 a v08-07, y v08-51 a v08-70, permite a atacantes provocar una denegaci\u00f3n de servicio (apagado y reinicio del sistema) a trav\u00e9s de vectores desconocidos."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:C" ,
2024-11-22 11:14:00 +00:00
"baseScore" : 7.8 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-11-22 11:14:00 +00:00
"availabilityImpact" : "COMPLETE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 6.9 ,
"acInsufInfo" : true ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-noinfo"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:serverconductor_\\/_deployment_manager:01-00:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "483A4791-D6D1-4B70-A00F-868FD02FD421"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:serverconductor_\\/_deployment_manager:01-01:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D51CCC1E-8598-4ADF-BE05-C01550925098"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:serverconductor_\\/_deployment_manager:06-00:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9FBC98F2-9204-4C8D-BAD6-E7718440F43F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:serverconductor_\\/_deployment_manager:06-00-\\/a:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "467C3A44-BB80-4618-B3A7-41D095D3D0C3"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:jp1\\/_serverconductor_\\/_deployment_manager:07-50:-:standard:*:*:*:*:*" ,
"matchCriteriaId" : "0542988B-39E2-4FE7-BAF3-E0EE3D06265A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:jp1\\/_serverconductor_\\/_deployment_manager:07-56-\\/f:-:standard:*:*:*:*:*" ,
"matchCriteriaId" : "7436B0CB-9888-4A06-BB5F-349155F2E089"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:jp1\\/_serverconductor_\\/_deployment_manager:08-00:-:standard:*:*:*:*:*" ,
"matchCriteriaId" : "1BC8411F-FD51-4499-96B6-105F26BCDF94"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:jp1\\/_serverconductor_\\/_deployment_manager:08-06:-:standard:*:*:*:*:*" ,
"matchCriteriaId" : "B32B8922-9700-4F5A-B2C9-583D8AC669FD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:jp1\\/_serverconductor_\\/_deployment_manager:08-07:-:standard:*:*:*:*:*" ,
"matchCriteriaId" : "23E9FDDB-56A5-48AA-A4FA-E84634B7E723"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:jp1\\/_serverconductor_\\/_deployment_manager:08-09-\\/e:-:standard:*:*:*:*:*" ,
"matchCriteriaId" : "01D1DB4B-C0C3-4134-8368-A31D95BDA42B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:jp1\\/_serverconductor_\\/_deployment_manager:08-50:-:standard:*:*:*:*:*" ,
"matchCriteriaId" : "8DA76C85-A290-469F-9B67-954F2E7FA6AE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:jp1\\/_serverconductor_\\/_deployment_manager:08-51:-:standard:*:*:*:*:*" ,
"matchCriteriaId" : "08B4C6CE-AC62-43A7-A986-02BC116385F6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:jp1\\/_serverconductor_\\/_deployment_manager:08-70:-:standard:*:*:*:*:*" ,
"matchCriteriaId" : "536DCF50-BB3E-4558-8F7B-3E196B63F1C3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:jp1\\/_serverconductor_\\/_deployment_manager:08-80-\\/a:-:standard:*:*:*:*:*" ,
"matchCriteriaId" : "3FDC4538-0B62-4C64-848C-211719D08FEB"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:jp1\\/_serverconductor_\\/_deployment_manager:07-52:-:enterprise:*:*:*:*:*" ,
"matchCriteriaId" : "AB770D16-A276-42DC-B279-9AD12E6CC4BD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:jp1\\/_serverconductor_\\/_deployment_manager:07-56-\\/f:-:enterprise:*:*:*:*:*" ,
"matchCriteriaId" : "4A66C82B-A1B5-40FF-AD27-D6AD2CDA9DB4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:jp1\\/_serverconductor_\\/_deployment_manager:08-00:-:enterprise:*:*:*:*:*" ,
"matchCriteriaId" : "3D5201C4-5136-4091-85CA-B70C1999F181"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:jp1\\/_serverconductor_\\/_deployment_manager:08-06:-:enterprise:*:*:*:*:*" ,
"matchCriteriaId" : "AF7CD95A-B373-471F-86BE-0E90B8445A72"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:jp1\\/_serverconductor_\\/_deployment_manager:08-07:-:enterprise:*:*:*:*:*" ,
"matchCriteriaId" : "EC449DDC-508F-40CB-9D81-CACF0AA4E617"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:jp1\\/_serverconductor_\\/_deployment_manager:08-09-\\/e:-:enterprise:*:*:*:*:*" ,
"matchCriteriaId" : "E7B9EF25-A548-497D-8514-30321FF8C1B4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:jp1\\/_serverconductor_\\/_deployment_manager:08-50:-:enterprise:*:*:*:*:*" ,
"matchCriteriaId" : "DC3EB893-15D9-44A9-A3E2-239850920709"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:jp1\\/_serverconductor_\\/_deployment_manager:08-52:-:enterprise:*:*:*:*:*" ,
"matchCriteriaId" : "24BA0A61-C8ED-4B1B-A6FC-7C9791BF587A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:jp1\\/_serverconductor_\\/_deployment_manager:08-70:-:enterprise:*:*:*:*:*" ,
"matchCriteriaId" : "76E65663-CB11-4610-A450-2009658C997B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:jp1\\/_serverconductor_\\/_deployment_manager:08-80-\\/a:-:enterprise:*:*:*:*:*" ,
"matchCriteriaId" : "D8F1B2B7-5F62-4F10-9399-86DCD5F9AC3B"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:serverconductor_\\/_deployment_manager:07-50:-:standard:*:*:*:*:*" ,
"matchCriteriaId" : "47EC9774-75D6-4051-BCA1-1FCC17AE2A62"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:serverconductor_\\/_deployment_manager:07-55:-:standard:*:*:*:*:*" ,
"matchCriteriaId" : "0211106C-7475-42AC-B097-41E0E8F0AD73"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:serverconductor_\\/_deployment_manager:07-57:-:standard:*:*:*:*:*" ,
"matchCriteriaId" : "58BC7948-4569-45DC-9F45-A353A1850ADA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:serverconductor_\\/_deployment_manager:07-59:-:standard:*:*:*:*:*" ,
"matchCriteriaId" : "3DDB87EF-1EAF-4577-959F-68AE23127E11"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:serverconductor_\\/_deployment_manager:07-50:-:enterprise:*:*:*:*:*" ,
"matchCriteriaId" : "A9FD1A84-F102-4ADB-83D2-26096361A26C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:serverconductor_\\/_deployment_manager:07-55:-:enterprise:*:*:*:*:*" ,
"matchCriteriaId" : "FA9CA436-DA61-4951-BD81-F2CF7B0D171B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:serverconductor_\\/_deployment_manager:07-57:-:enterprise:*:*:*:*:*" ,
"matchCriteriaId" : "77D562C6-2021-49D8-A49A-71B461849099"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hitachi:serverconductor_\\/_deployment_manager:07-59:-:enterprise:*:*:*:*:*" ,
"matchCriteriaId" : "D5AE0C60-7290-4118-8944-9C2F67D15A26"
}
]
}
]
}
] ,
"references" : [
2024-04-04 08:46:00 +00:00
{
"url" : "http://osvdb.org/65833" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "http://secunia.com/advisories/40343" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS10-013/index.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2010/1635" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
2024-11-22 11:14:00 +00:00
} ,
{
"url" : "http://osvdb.org/65833" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "http://secunia.com/advisories/40343" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS10-013/index.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2010/1635" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}