JVN#16318793
        Ichitaro series vulnerable to arbitrary code execution
                Critical
              
      
      Overview
The "Ichitaro" series word processing software, from JustSystems Corporation contains a vulnerability that may allow arbitrary code execution.
This vulnerability differs from other issues that were previously published on JVN.
Products Affected
- Ichitaro 2014 Tetsu
- Ichitaro 2014 Tetsu Trial Edition
- Ichitaro 2013 Gen
- Ichitaro 2012 Shou
- Ichitaro 2011 Sou / Ichitaro 2011
- Ichitaro Pro 2
- Ichitaro Pro 2 Trial Edition
- Ichitaro Pro
- Ichitaro Government 7
- Ichitaro Government 6
- Ichitaro 2010, Ichitaro Government 2010
- Ichitaro 2009, Ichitaro Government 2009
- Ichitaro 2008, Ichitaro Government 2008
Description
The "Ichitaro" series word processing software, from JustSystems Corporation contains a vulnerability that may allow arbitrary code execution.
For more information, please refer to the developer's website.
Impact
When a user opens a specially crafted file, arbitrary code may be executed.
Solution
Update the software
Apply the appropriate update module according to the information provided by the developer.
Vendor Status
| Vendor | Link | 
| JustSystems Corporation | [JS14003] Vulnerability in Ichitaro may allow arbitrary code execution | 
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Analyzed on 2014.11.13 (CVSS Base Metrics) Critical
| Measures | Severity | Description | ||
|---|---|---|---|---|
| Access Vector(AV) | Local (L) | Adjacent Network (A) | Network (N) | A vulnerability exploitable with network access means the vulnerable software is bound to the network stack and the attacker does not require local network access or local access. Such a vulnerability is often termed "remotely exploitable". | 
| Access Complexity(AC) | High (H) | Medium (M) | Low (L) | The access conditions are somewhat specialized. | 
| Authentication(Au) | Multiple (M) | Single (S) | None (N) | Authentication is not required to exploit the vulnerability. | 
| Confidentiality Impact(C) | None (N) | Partial (P) | Complete (C) | There is total information disclosure, resulting in all system files being revealed. | 
| Integrity Impact(I) | None (N) | Partial (P) | Complete (C) | There is a total compromise of system integrity. There is a complete loss of system protection, resulting in the entire system being compromised. | 
| Availability Impact(A) | None (N) | Partial (P) | Complete (C) | There is a total shutdown of the affected resource. | 
Base Score:9.3
Credit
Other Information
| JPCERT Alert |  | 
| JPCERT Reports |  | 
| CERT Advisory |  | 
| CPNI Advisory |  | 
| TRnotes |  | 
| CVE | CVE-2014-7247 | 
| JVN iPedia | JVNDB-2014-000131 | 
