First published: Thu Oct 19 2023(Updated: )
An out-of-bounds write vulnerability exists within the parsers for both the "DocumentViewStyles" and "DocumentEditStyles" streams of Ichitaro 2023 1.0.1.59372 when processing types 0x0000-0x0009 of a style record with the type 0x2008. A specially crafted document can cause memory corruption, which can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Justsystems Easy Postcard Max | ||
Justsystems Ichitaro | ||
Justsystems Ichitaro 2022 | ||
Justsystems Ichitaro 2023 | =1.0.1.59372 | |
Justsystems Ichitaro Government 10 | ||
Justsystems Ichitaro Government 8 | ||
Justsystems Ichitaro Government 9 | ||
Justsystems Ichitaro Pro 3 | ||
Justsystems Ichitaro Pro 4 | ||
Justsystems Ichitaro Pro 5 | ||
Justsystems Just Government | ||
Justsystems Just Government | ||
Justsystems Just Government | ||
Justsystems Just Office 3 | ||
Justsystems Just Office 4 | ||
Justsystems Just Office 5 | ||
Justsystems Just Police 3 | ||
Justsystems Just Police 4 | ||
Justsystems Just Police 5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-35126 has been classified as a critical vulnerability due to the potential for memory corruption leading to arbitrary code execution.
To fix CVE-2023-35126, update affected software versions of Justsystems Ichitaro to the latest release that addresses this vulnerability.
CVE-2023-35126 affects Justsystems Ichitaro 2023 version 1.0.1.59372 and other related products including various versions of Ichitaro 2021, 2022, and government editions.
CVE-2023-35126 can be exploited through specially crafted documents that trigger the out-of-bounds write vulnerability during parsing.
Yes, there are reports of exploits being developed for CVE-2023-35126, emphasizing the need for immediate mitigation.