Published:2011/06/16  Last Updated:2011/06/16

JVN#87239473
Ichitaro series vulnerable to arbitrary code execution

Overview

The "Ichitaro" series word processing software, from JustSystems Corporation contains a vulnerability that may allow arbitrary code execution.
This vulnerability differs from other issues that were previously published on JVN.

Products Affected

  • Ichitaro
  • Ichitaro Government
  • Ichitaro Portable
  • Ichitaro Pro
  • Ichitaro Viewer
For more information, refer to the developer's website.

Description

The "Ichitaro" series word processing software, from JustSystems Corporation contains a vulnerability that may allow arbitrary code execution.

Impact

When opening a specially crafted file locally or through a website, an attacker may be able to execute arbitrary code.

Solution

Update the Software
Update to the latest version according to the information provided by the developer.

References

  1. IPA
    Security Alert for Vulnerability in the Ichitaro Series

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Analyzed on 2011.06.16

Measures Conditions Severity
Access Required can be attacked over the Internet using packets
  • High
Authentication anonymous or no authentication (IP addresses do not count)
  • High
User Interaction Required the user must be convinced to take a standard action that does not feel harmful to most users, such as click on a link or view a file
  • Mid
Exploit Complexity expertise and/or luck required (guessing correctly in medium-sized space, kernel expertise)
  • Low-Mid

Description of each analysis measures

Credit

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2011-1331
JVN iPedia JVNDB-2011-000043

Update History

2011/06/16
Information under the sections "References" were modified.