Ichitaro.RAKSL.Memory.Corruption

description-logoDescription

This indicates an attack attempt to exploit a Memory Corruption vulnerability in JustSystems Ichitaro Office.
The vulnerability is due to an error when the vulnerable software handles an JYT file. An attacker can exploit this to execute arbitrary code within the context of the logged in user via a crafted JYT file.

affected-products-logoAffected Products

Rakuraku Hagaki and Rakuraku Hagaki Select for Ichitaro

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Refer to the vendor's advisory for updates:
http://www.justsystems.com/jp/info/js17003.html

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)