First published: Wed Aug 09 2023(Updated: )
"FFRI yarai", "FFRI yarai Home and Business Edition" and their OEM products handle exceptional conditions improperly, which may lead to denial-of-service (DoS) condition. Affected products and versions are as follows: FFRI yarai versions 3.4.0 to 3.4.6 and 3.5.0, FFRI yarai Home and Business Edition version 1.4.0, InfoTrace Mark II Malware Protection (Mark II Zerona) versions 3.0.1 to 3.2.2, Zerona / Zerona PLUS versions 3.2.32 to 3.2.36, ActSecure ? versions 3.4.0 to 3.4.6 and 3.5.0, Dual Safe Powered by FFRI yarai version 1.4.1, EDR Plus Pack (Bundled FFRI yarai versions 3.4.0 to 3.4.6 and 3.5.0), and EDR Plus Pack Cloud (Bundled FFRI yarai versions 3.4.0 to 3.4.6 and 3.5.0).
Credit: vultures@jpcert.or.jp vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Ffri Dual Safe | =1.4.1 | |
Ffri Ffri Yarai | >=3.4.0<=3.4.6 | |
Ffri Ffri Yarai | =1.4.0 | |
Ffri Ffri Yarai | =3.5.0 | |
Soliton Infotrace Mark Ii Malware Protection | >=3.0.1<=3.2.2 | |
Soliton Zerona | >=3.2.32<=3.2.36 | |
Soliton Zerona Plus | >=3.2.32<=3.2.36 | |
Nec Actsecure X Managed Security Service | >=3.4.0<=3.4.6 | |
Nec Actsecure X Managed Security Service | =3.5.0 | |
Skygroup Edr Plus Pack | >=3.4.0<=3.4.6 | |
Skygroup Edr Plus Pack | =3.5.0 | |
Skygroup Edr Plus Pack Cloud | >=3.4.0<=3.4.6 | |
Skygroup Edr Plus Pack Cloud | =3.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2023-39341.
The severity of CVE-2023-39341 is low, with a severity value of 3.3.
The affected products for CVE-2023-39341 include FFRI yarai versions 3.4.0 to 3.4.6 and 3.5.0, FFRI yarai Home and Business Edition version 1.4.0, and various OEM products.
CVE-2023-39341 can lead to a denial-of-service (DoS) condition in the affected products.
Yes, you can find references for CVE-2023-39341 at the following links: [Reference 1](https://jvn.jp/en/jp/JVN42527152/), [Reference 2](https://www.ffri.jp/security-info/index.htm), [Reference 3](https://www.skyseaclientview.net/news/230807_01/).