JVN#09619876
        Multiple JustSystems products vulnerable to buffer overflow
              
      
      Overview
Multiple products provided by JustSystems Corporation contain a buffer overflow vulnerability.
Products Affected
- Ichitaro 2012 Shou
 - Ichitaro 2011 Sou
 - Ichitaro 2011/2010/2009/2008/2007/2006
 - Ichitaro Government 2010/2009/2008/2007/2006
 - Ichitaro Portable with oreplug
 - Ichitaro Viewer
 - JUST School 2010/2009
 - JUST School
 - JUST Jump 4
 - JUST Frontier
 - oreplug
 - Shuriken 2010/2009/2008/2007/Pro4
 - Shuriken 2010 CE/2009 CE/2008 CE/2007 [Corporate Edition]/Pro4 [Corporate Edition]
 - Rekishimail Sengokubusho no missho/Bakumatsushishi no missho
 
Description
Multiple products provided by JustSystems Corporation contain a buffer overflow vulnerability due to improper handling of image files.
Impact
If this vulnerability is exploited, a system may be crashed or arbitrary code may be executed.
Solution
Update the Software
Apply the appropriate update according to the information provided by the developer.
Vendor Status
| Vendor | Link | 
| JustSystems Corporation | [JS12001] Vulnerability in Ichitaro/Shuriken may allow arbitrary code execution (Japanese Only) | 
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Analyzed on 2012.04.24
| Measures | Conditions | Severity | 
|---|---|---|
| Access Required | can be attacked over the Internet using packets | 
                
  | 
            
| Authentication | anonymous or no authentication (IP addresses do not count) | 
                
  | 
            
| User Interaction Required | the user must be convinced to take a standard action that does not feel harmful to most users, such as click on a link or view a file | 
                
  | 
            
| Exploit Complexity | some expertise and/or luck required (most buffer overflows, guessing correctly in small space, expertise in Windows function calls) | 
                
  | 
            
Credit
Tielei Wang of Georgia Tech Information Security Center reported this vulnerability to JPCERT/CC via The Secunia Vulnerability Coordination Reward Programme (SVCRP).
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Other Information
| JPCERT Alert | |
| JPCERT Reports | |
| CERT Advisory | 
                                     | 
              
| CPNI Advisory | 
                                     | 
              
| TRnotes | 
                                     | 
              
| CVE | 
                                    CVE-2012-0269 | 
              
| JVN iPedia | 
                                    JVNDB-2012-000035 | 
              
Update History
- 2012/04/24
 - Information under the section "References" was added.
 - 2012/05/08
 - Information under the section "Products Affected" was updated.