-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2012.0028
   A vulnerability has been identified in Hitachi Command Suite Products
                             22 February 2012

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Hitachi Device Manager
                      Hitachi Tiered Storage Manager
Operating System:     Windows
                      Solaris
                      Red Hat
                      SUSE
Impact/Access:        Cross-site Scripting -- Remote with User Interaction
Resolution:           Patch/Upgrade
Member content until: Friday, March 23 2012

OVERVIEW

        A cross site scripting vulnerability has been identified in Hitachi 
        Command Suite Products. [1]


IMPACT

        The vendor has provided the following description of the vulnerability:
        
        "A cross-site scripting vulnerability was found in Hitachi Command
        Suite Products. Remote users can exploit this vulnerability to execute
        malicious scripts." [1]


MITIGATION

        All versions of Hitachi Device Manager Software and Hitachi Tiered
        Storage Manager Software should be upgraded to the latest version
        which is 7.2.1-00 for all listed platforms. [1]


REFERENCES

        [1] Cross-site Scripting Vulnerability in Hitachi Command Suite
            Products
            http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-008/index.html

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=BWi6
-----END PGP SIGNATURE-----