Memory corruption in Ichitaro - CVE-2009-1054

 

Memory corruption in Ichitaro - CVE-2009-1054

Published: December 22, 2016 / Updated: March 13, 2017


Vulnerability identifier: #VU2706
CSH Severity: Critical
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Red
CVE-ID: CVE-2009-1054
CWE-ID: CWE-119
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: JustSystems Corporation
Affected software:
Ichitaro

Detailed vulnerability description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to boundary error when parsing a malformed file. A remote attacker can create a specially crafted file or document using Web PURAGUINBYUA, trick the victim into opening it, trigger memory corruption, run a malicious program and execute arbitrary code on the system with privileges of the current user.

Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.

Note: the vulnerability was being actively exploited.

How to mitigate CVE-2009-1054

Install update from vendor's website:
http://www.justsystems.com/jp/info/js09001.html

Sources