CVE-2017-10870

Memory corruption vulnerability in Rakuraku Hagaki (Rakuraku Hagaki 2018, Rakuraku Hagaki 2017, Rakuraku Hagaki 2016) and Rakuraku Hagaki Select for Ichitaro (Ichitaro 2017, Ichitaro 2016, Ichitaro 2015, Ichitaro Pro3, Ichitaro Pro2, Ichitaro Pro, Ichitaro 2011, Ichitaro Government 8, Ichitaro Government 7, Ichitaro Government 6 and Ichitaro 2017 Trial version) allows attackers to execute arbitrary code with privileges of the application via specially crafted file.
References
Link Resource
https://jvn.jp/en/vu/JVNVU93703434/index.html Third Party Advisory VDB Entry
https://www.justsystems.com/jp/info/js17003.html Patch Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:justsystems:easy_postcard_2016:-:*:*:*:*:*:*:*
cpe:2.3:a:justsystems:easy_postcard_2017:-:*:*:*:*:*:*:*
cpe:2.3:a:justsystems:easy_postcard_2018:-:*:*:*:*:*:*:*
cpe:2.3:a:justsystems:ichitaro_2016:-:*:*:*:*:*:*:*
cpe:2.3:a:justsystems:ichitaro_2017:-:*:*:*:*:*:*:*
cpe:2.3:a:justsystems:ichitaro_2017_trial_version:-:*:*:*:*:*:*:*
cpe:2.3:a:justsystems:ichitaro_2018:-:*:*:*:*:*:*:*
cpe:2.3:a:justsystems:ichitaro_government_6:-:*:*:*:*:*:*:*
cpe:2.3:a:justsystems:ichitaro_government_7:-:*:*:*:*:*:*:*
cpe:2.3:a:justsystems:ichitaro_government_8:-:*:*:*:*:*:*:*
cpe:2.3:a:justsystems:ichitaro_pro:-:*:*:*:*:*:*:*
cpe:2.3:a:justsystems:ichitaro_pro_2:-:*:*:*:*:*:*:*
cpe:2.3:a:justsystems:ichitaro_pro_2011:-:*:*:*:*:*:*:*
cpe:2.3:a:justsystems:ichitaro_pro_3:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2017-11-02 15:29

Updated : 2023-12-10 12:15


NVD link : CVE-2017-10870

Mitre link : CVE-2017-10870

CVE.ORG link : CVE-2017-10870


JSON object : View

Products Affected

justsystems

  • ichitaro_pro_2011
  • ichitaro_2016
  • ichitaro_2017_trial_version
  • ichitaro_pro
  • ichitaro_2018
  • ichitaro_pro_3
  • ichitaro_2017
  • ichitaro_government_6
  • easy_postcard_2018
  • ichitaro_pro_2
  • easy_postcard_2017
  • ichitaro_government_7
  • easy_postcard_2016
  • ichitaro_government_8
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer