製品・ソフトウェアに関する情報
Hitachi Web ServerのSSLクライアント認証における脆弱性
Title Hitachi Web ServerのSSLクライアント認証における脆弱性
Summary

SSLクライアント認証において,Webサーバに接続しようとしているクライアントが送付するクライアント証明書が不正なものであっても,不当に正しい証明書として検証してしまう脆弱性が存在します。 本脆弱性は、クライアント認証の機能を使用していない場合は影響を受けない事がベンダより報告されています。

Possible impacts 第三者によって不正な証明書を用いてアクセスされる可能性があります。
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date Oct. 5, 2007, midnight
Registration Date Oct. 23, 2007, 3:55 p.m.
Last Update May 23, 2014, 6:32 p.m.
CVSS2.0 : 警告
Score 5
Vector AV:N/AC:L/Au:N/C:P/I:N/A:N
Affected System
日立
Cosminexus Application Server Enterprise Version 6
Cosminexus Application Server Standard Version 6
Cosminexus Application Server Version 5 
Cosminexus Developer Light Version 6 
Cosminexus Developer Professional Version 6 
Cosminexus Developer Standard Version 6 
Cosminexus Developer Version 5 
Cosminexus Server - Enterprise Edition 
Cosminexus Server - Standard Edition 
Cosminexus Server - Standard Edition Version 4 
Cosminexus Server - Web Edition 
Cosminexus Server - Web Edition Version 4 
Hitachi Web Server 
uCosminexus Application Server Enterprise 
uCosminexus Application Server Standard 
uCosminexus Developer Professional
uCosminexus Developer Light 
uCosminexus Developer Standard 
uCosminexus Service Architect 
uCosminexus Service Platform 
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
その他
Change Log
No Changed Details Date of change
0 [2007年10月23日]
  掲載
[2014年05月23日]
  参考情報:Common Vulnerabilities and Exposures (CVE) (CVE-2006-4339) を追加
  参考情報:National Vulnerability Database (NVD) (CVE-2006-43394) を追加
Feb. 17, 2018, 10:37 a.m.

NVD Vulnerability Information
CVE-2006-4339
Summary

OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.

Publication Date Sept. 6, 2006, 2:04 a.m.
Registration Date Jan. 29, 2021, 3:44 p.m.
Last Update Oct. 18, 2018, 6:35 a.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.3a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5a:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5a:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6:beta3:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6a:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6a:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6a:beta3:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6l:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6m:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* 0.9.7
cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7h:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7i:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7j:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List
CVE-2007-5810
Summary

Hitachi Web Server 01-00 through 03-00-01, as used by certain Cosminexus products, does not properly validate SSL client certificates, which might allow remote attackers to spoof authentication via a client certificate with a forged signature.

Summary

Hitachi Web Server 01-00 hasta 03-00-01, tal y como se usa en determinados productos Cosminexus, no valida apropiadamente certificados SSL cliente, lo cual podría permitir a atacantes remotos suplantar autenticación mediante un certificado cliente con una firma falsificada.

Publication Date Nov. 6, 2007, 2:46 a.m.
Registration Date Jan. 29, 2021, 2:23 p.m.
Last Update April 23, 2026, 9:35 a.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:hitachi:cosminexus_application_server_enterprise:*:*:*:*:*:*:*:* 06_51_j
cpe:2.3:a:hitachi:cosminexus_application_server_standard:*:*:*:*:*:*:*:* 06_51_j
cpe:2.3:a:hitachi:cosminexus_developer_light_version_6:*:*:*:*:*:*:*:* 06_51_j
cpe:2.3:a:hitachi:cosminexus_developer_professional_version_6:*:*:*:*:*:*:*:* 06_51_j
cpe:2.3:a:hitachi:cosminexus_developer_standard_version_6:*:*:*:*:*:*:*:* 06_51_j
cpe:2.3:a:hitachi:cosminexus_server:*:*:*:*:*:*:*:* 04_01
cpe:2.3:a:hitachi:ucosminexus_application_server_enterprise:*:*:*:*:*:*:*:* 07_50_01
cpe:2.3:a:hitachi:ucosminexus_application_server_standard:*:*:*:*:*:*:*:* 07_50_01
cpe:2.3:a:hitachi:ucosminexus_developer_light:*:*:*:*:*:*:*:* 06_71_d
cpe:2.3:a:hitachi:ucosminexus_developer_professional:*:*:*:*:*:*:*:* 07_50_01
cpe:2.3:a:hitachi:ucosminexus_developer_standard:*:*:*:*:*:*:*:* 07_50_01
cpe:2.3:a:hitachi:ucosminexus_service_architect:*:*:*:*:*:*:*:* 07_50_01
cpe:2.3:a:hitachi:ucosminexus_service_platform:*:*:*:*:*:*:*:* 07_50_01
cpe:2.3:a:hitachi:web_server:01_00:*:hpux:*:*:*:*:*
cpe:2.3:a:hitachi:web_server:01_00:*:solaris:*:*:*:*:*
cpe:2.3:a:hitachi:web_server:01_01:*:aix:*:*:*:*:*
cpe:2.3:a:hitachi:web_server:01_01:*:linux:*:*:*:*:*
cpe:2.3:a:hitachi:web_server:01_01:*:turbolinux:*:*:*:*:*
cpe:2.3:a:hitachi:web_server:01_01_d:*:linux:*:*:*:*:*
cpe:2.3:a:hitachi:web_server:01_02_d:*:hpux:*:*:*:*:*
cpe:2.3:a:hitachi:web_server:01_02_d:*:solaris:*:*:*:*:*
cpe:2.3:a:hitachi:web_server:01_02_e:*:aix:*:*:*:*:*
cpe:2.3:a:hitachi:web_server:02_00:*:aix:*:*:*:*:*
cpe:2.3:a:hitachi:web_server:02_00:*:hpux:*:*:*:*:*
cpe:2.3:a:hitachi:web_server:02_00:*:linux:*:*:*:*:*
cpe:2.3:a:hitachi:web_server:02_00:*:solaris:*:*:*:*:*
cpe:2.3:a:hitachi:web_server:02_00:*:turbolinux:*:*:*:*:*
cpe:2.3:a:hitachi:web_server:02_00:*:windows:*:*:*:*:*
cpe:2.3:a:hitachi:web_server:02_00_a:*:linux:*:*:*:*:*
cpe:2.3:a:hitachi:web_server:02_02:*:hpux:*:*:*:*:*
cpe:2.3:a:hitachi:web_server:02_02:*:hpux\(ipf\):*:*:*:*:*
cpe:2.3:a:hitachi:web_server:02_02:*:linux:*:*:*:*:*
cpe:2.3:a:hitachi:web_server:02_04_b:*:aix:*:*:*:*:*
cpe:2.3:a:hitachi:web_server:02_04_b:*:hpux:*:*:*:*:*
cpe:2.3:a:hitachi:web_server:02_04_b:*:hpux\(ipf\):*:*:*:*:*
cpe:2.3:a:hitachi:web_server:02_04_b:*:solaris:*:*:*:*:*
cpe:2.3:a:hitachi:web_server:02_04_b:*:windows:*:*:*:*:*
cpe:2.3:a:hitachi:web_server:02_06_a:*:linux:*:*:*:*:*
cpe:2.3:a:hitachi:web_server:03_00:*:aix:*:*:*:*:*
cpe:2.3:a:hitachi:web_server:03_00:*:hpux\(ipf\):*:*:*:*:*
cpe:2.3:a:hitachi:web_server:03_00:*:linux:*:*:*:*:*
cpe:2.3:a:hitachi:web_server:03_00:*:windows:*:*:*:*:*
cpe:2.3:a:hitachi:web_server:03_00_01:*:solaris:*:*:*:*:*
cpe:2.3:a:hitachi:web_server:03_00_01:*:windows:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List