---------------------------------------------------------------------- 2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published How do you know which Secunia advisories are important to you? The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively. Get a free trial of the Secunia Vulnerability Intelligence Solutions: http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv ---------------------------------------------------------------------- TITLE: JustSystems Ichitaro Document Processing Multiple Buffer Overflows SECUNIA ADVISORY ID: SA27393 VERIFY ADVISORY: http://secunia.com/advisories/27393/ CRITICAL: Highly critical IMPACT: DoS, System access WHERE: >From remote SOFTWARE: Ichitaro viewer 4.x http://secunia.com/product/12808/ Ichitaro Lite2 http://secunia.com/product/12807/ Ichitaro for Linux http://secunia.com/product/11596/ Ichitaro 2007 http://secunia.com/product/13868/ Ichitaro 2006 http://secunia.com/product/11604/ Ichitaro 2005 http://secunia.com/product/11603/ Ichitaro 2004 http://secunia.com/product/11602/ Ichitaro 13.x http://secunia.com/product/11601/ Ichitaro 12.x http://secunia.com/product/11600/ Ichitaro 11.x http://secunia.com/product/11599/ Ichitaro Punch http://secunia.com/product/16316/ DESCRIPTION: Hiroshi Ukai has reported some vulnerabilities in Ichitaro, which can be exploited by malicious people to compromise a user's system. 1) Two boundary errors within JSTARO4.OCX can be exploited to cause stack-based buffer overflows when a specially crafted document is opened, e.g. via the browser plug-in. 2) A boundary error within TJSVDA.DLL can be exploited to cause a buffer overflow when a specially crafted document is opened, e.g. via the browser plug-in. Successful exploitation allows execution of arbitrary code. SOLUTION: The vendor has released updates (please see vendor advisory for details). http://www.justsystems.com/jp/info/pd7004.html PROVIDED AND/OR DISCOVERED BY: Hiroshi Ukai, Fourteenfourty Research Institute ORIGINAL ADVISORY: JustSystems: http://www.justsystems.com/jp/info/pd7004.html Fourteenfourty Research Institute: http://www.fourteenforty.jp/research/advisory.cgi?FFRRA-20071025-1 http://www.fourteenforty.jp/research/advisory.cgi?FFRRA-20071025-2 http://www.fourteenforty.jp/research/advisory.cgi?FFRRA-20071025-3 OTHER REFERENCES: JVN: http://jvn.jp/jp/JVN%2329211062/index.html http://jvn.jp/jp/JVN%2332981509/index.html http://jvn.jp/jp/JVN%2350495547/index.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------