Intrusion Prevention

Ichitaro.RAKSL.Memory.Corruption

Description

This indicates an attack attempt to exploit a Memory Corruption vulnerability in JustSystems Ichitaro Office.
The vulnerability is due to an error when the vulnerable software handles an JYT file. An attacker can exploit this to execute arbitrary code within the context of the logged in user via a crafted JYT file.

Affected Products

Rakuraku Hagaki and Rakuraku Hagaki Select for Ichitaro

Impact

System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Refer to the vendor's advisory for updates:
http://www.justsystems.com/jp/info/js17003.html

CVE References

CVE-2017-10870