CVE-2017-2791
https://notcve.org/view.php?id=CVE-2017-2791
JustSystems Ichitaro 2016 Trial contains a vulnerability that exists when trying to open a specially crafted PowerPoint file. Due to the application incorrectly handling the error case for a function's result, the application will use this result in a pointer calculation for reading file data into. Due to this, the application will read data from the file into an invalid address thus corrupting memory. Under the right conditions, this can lead to code execution under the context of the application. JustSystems Ichitaro 2016 Trial contiene una vulnerabilidad que existe al tratar de abrir un archivo de PowerPoint especialmente manipulado. • http://www.securityfocus.com/bid/96440 http://www.talosintelligence.com/reports/TALOS-2016-0199 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2017-2790
https://notcve.org/view.php?id=CVE-2017-2790
When processing a record type of 0x3c from a Workbook stream from an Excel file (.xls), JustSystems Ichitaro Office trusts that the size is greater than zero, subtracts one from the length, and uses this result as the size for a memcpy. This results in a heap-based buffer overflow and can lead to code execution under the context of the application. Cuando se procesa un tipo de registro de 0x3c flujo Workbookdesde un archivo Excel (.xls), JustSystems Ichitaro Office confía que el tamaño es mayor que cero, substrae uno de la longitud, y utiliza este resultado como el tamaño de una memcpy. Esto resulta en un desbordamiento de búfer basado en memoria dinámica y puede conducir a ejecución de código bajo el contexto de la aplicación. • http://www.securityfocus.com/bid/96442 http://www.talosintelligence.com/reports/TALOS-2016-0197 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2017-2789
https://notcve.org/view.php?id=CVE-2017-2789
When copying filedata into a buffer, JustSystems Ichitaro Office 2016 Trial will calculate two values to determine how much data to copy from the document. If both of these values are larger than the size of the buffer, the application will choose the smaller of the two and trust it to copy data from the file. This value is larger than the buffer size, which leads to a heap-based buffer overflow. This overflow corrupts an offset in the heap used in pointer arithmetic for writing data and can lead to code execution under the context of the application. Cuando se copian datos de archivos en un búfer, JustSystems Ichitaro Office 2016 Trial calculará dos valores para determinar cuantos datos copiar desde el documento. • http://www.securityfocus.com/bid/96438 http://www.talosintelligence.com/reports/TALOS-2016-0196 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2014-7247
https://notcve.org/view.php?id=CVE-2014-7247
Unspecified vulnerability in JustSystems Ichitaro 2008 through 2011; Ichitaro Government 6, 7, 2008, 2009, and 2010; Ichitaro Pro; Ichitaro Pro 2; Ichitaro 2011 Sou; Ichitaro 2012 Shou; Ichitaro 2013 Gen; and Ichitaro 2014 Tetsu allows remote attackers to execute arbitrary code via a crafted file. Vulnerabilidad no especificada en JustSystems Ichitaro 2008 hasta 2011; Ichitaro Government 6, 7, 2008, 2009, y 2010; Ichitaro Pro; Ichitaro Pro 2; Ichitaro 2011 Sou; Ichitaro 2012 Shou; Ichitaro 2013 Gen; y Ichitaro 2014 Tetsu permite a atacantes remotos ejecutar código arbitrario a través de un fichero manipulado. • http://jvn.jp/en/jp/JVN16318793/index.html http://jvndb.jvn.jp/jvndb/JVNDB-2014-000131 http://www.justsystems.com/jp/info/js14003.html • CWE-19: Data Processing Errors •
CVE-2014-2003
https://notcve.org/view.php?id=CVE-2014-2003
JustSystems JUST Online Update, as used in Ichitaro through 2014 and other products, does not properly validate signatures of update modules, which allows remote attackers to spoof modules and execute arbitrary code via a crafted signature. JustSystems JUST Online Update, utilizado en Ichitaro hasta 2014 y otros productos, no valida debidamente firmas de módulos de actualización, lo que permite a atacantes remotos falsificar módulos y ejecutar código arbitrario a través de una firma manipulada. • http://jvn.jp/en/jp/JVN50129191/index.html http://jvndb.jvn.jp/jvndb/JVNDB-2014-000053 http://www.ipa.go.jp/security/ciadr/vul/20140611-jvn.html http://www.justsystems.com/jp/info/js14002.html • CWE-20: Improper Input Validation •