Researchers Find Flaws in Japanese Word Processor IchitaroJustSystems, Maker of Ichitaro, Says No Attacks Have Been Spotted
Security researchers uncovered vulnerabilities in a word processing application used primarily in Japan, warning that malicious documents could let hackers seize control.
Cisco Talos on Wednesday reported it had identified four arbitrary code execution flaws in the Ichitaro word processor. The word processor maker, JustSystems, said it has not confirmed any attacks exploiting the vulnerabilities and has issued fixes for the flaws.
Once dominant in the Japanese market, Ichitaro ceded considerable market share to the Microsoft Office suite of programs during the 1990s but is still commonly described as the country's second-most-used word processing application. It uses a
.jtd format, which Fortinet describes as an Object Linking and Embedding format.
Talos says CVE-2022-43664 can trigger the reuse of freed memory by the attacker -ultimately resulting in arbitrary code execution - while CVE-2023-22660 gets to arbitrary code execution through a bugger overflow condition.
JustSystems said the flaws affected the 2021, 2022 and 2023 versions of Ichitaro along with the Ichitaro 2022 Trial Version and Ichitaro Viewer, and enabled an attacker to crash the application.
Japan's Computer Emergency Response Team said the vulnerabilities also affected additional JustSystems products.
Ichitaro has gone through security incidents in the past, including in 2013, when attackers, possibly of Chinese state origin, exploited a zero-day vulnerability.