CVE-2011-1331
Published Jul 18, 2011
Last updated 7 years ago
Overview
- Description
- JustSystems Ichitaro 2005 through 2011, Ichitaro Government 6, Ichitaro Government 2006 through 2010, Ichitaro Portable, Ichitaro Pro, and Ichitaro Viewer allow remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted document, as exploited in the wild in early 2011.
- Source
- vultures@jpcert.or.jp
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 9.3
- Impact score
- 10
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-119
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:justsystems:ichitaro:6:-:government:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9056648E-34A1-471E-BB5A-FB50FB1C81DB" }, { "criteria": "cpe:2.3:a:justsystems:ichitaro:2005:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "471FA5F8-8EC2-4FEB-93E0-B838F81BD472" }, { "criteria": "cpe:2.3:a:justsystems:ichitaro:2006:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9E7E7611-56FC-4379-99FE-8D42046FA9C8" }, { "criteria": "cpe:2.3:a:justsystems:ichitaro:2006:-:government:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AA38365F-0FB9-4570-8A38-4FCC9AADA267" }, { "criteria": "cpe:2.3:a:justsystems:ichitaro:2007:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A749FA56-6DE2-48A4-902C-6EB7E6575BA3" }, { "criteria": "cpe:2.3:a:justsystems:ichitaro:2007:-:government:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6A5C721C-CA01-4C6A-AC7C-C07FC3A333D3" }, { "criteria": "cpe:2.3:a:justsystems:ichitaro:2008:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8B8FAFF2-94AD-4C8B-8B10-57651DEA6191" }, { "criteria": "cpe:2.3:a:justsystems:ichitaro:2008:-:government:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "25F1AF4E-E4EC-4E66-B532-002A8512916F" }, { "criteria": "cpe:2.3:a:justsystems:ichitaro:2009:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "12205BDB-6DD6-46B8-891B-E4EAAB8F3588" }, { "criteria": "cpe:2.3:a:justsystems:ichitaro:2009:-:government:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9BC34189-32FE-4C8E-A87E-731C622ECBC0" }, { "criteria": "cpe:2.3:a:justsystems:ichitaro:2010:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C9C3EDDB-E30F-45BA-94C4-5C917283971E" }, { "criteria": "cpe:2.3:a:justsystems:ichitaro:2010:-:government:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6881ACA2-0625-4E3F-8136-D20E627BFC9E" }, { "criteria": "cpe:2.3:a:justsystems:ichitaro:2011:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3A4975EC-E1DB-45C0-AFF6-C3E97F273332" }, { "criteria": "cpe:2.3:a:justsystems:ichitaro_portable:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF040552-87C3-40B5-AA54-950207AB387C" }, { "criteria": "cpe:2.3:a:justsystems:ichitaro_pro:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B6622EC-6ACF-4A02-BDF8-70C0EFD4471A" }, { "criteria": "cpe:2.3:a:justsystems:ichitaro_viewer:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6FB0BAF8-1958-4CA5-801F-BE36FA327726" }, { "criteria": "cpe:2.3:a:justsystems:ichitaro_viewer:5.1.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B34749C6-8E19-47B2-B5F7-0F98B122FCE1" }, { "criteria": "cpe:2.3:a:justsystems:ichitaro_viewer:19.0.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7D726C33-139F-4514-BDFC-FE8F046B47CF" }, { "criteria": "cpe:2.3:a:justsystems:ichitaro_viewer:19.0.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF6BBB43-6E50-4E6F-80A3-217A431D9A6A" }, { "criteria": "cpe:2.3:a:justsystems:ichitaro_viewer:19.0.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6A008907-514E-4924-953C-3F09329CF26A" }, { "criteria": "cpe:2.3:a:justsystems:ichitaro_viewer:20.0.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "52CAFFC5-453F-49DD-8A71-8FB98C045A4C" } ], "operator": "OR" } ] } ]