A use-after-free vulnerability exists within the way Ichitaro Word Processor 2022, version 1.0.1.57600, processes protected documents. A specially crafted document can trigger reuse of freed memory, which can lead to further memory corruption and potentially result in arbitrary code execution. An attacker can provide a malicious document to trigger this vulnerability.
References
Link | Resource |
---|---|
https://jvn.jp/en/jp/JVN79149117/ | Third Party Advisory VDB Entry |
https://talosintelligence.com/vulnerability_reports/TALOS-2022-1673 | Exploit Third Party Advisory |
https://jvn.jp/en/jp/JVN79149117/ | Third Party Advisory VDB Entry |
https://talosintelligence.com/vulnerability_reports/TALOS-2022-1673 | Exploit Third Party Advisory |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1673 |
Configurations
History
21 Nov 2024, 07:26
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://jvn.jp/en/jp/JVN79149117/ - Third Party Advisory, VDB Entry | |
References | () https://talosintelligence.com/vulnerability_reports/TALOS-2022-1673 - Exploit, Third Party Advisory |
Information
Published : 2023-04-05 16:15
Updated : 2024-11-21 07:26
NVD link : CVE-2022-43664
Mitre link : CVE-2022-43664
CVE.ORG link : CVE-2022-43664
JSON object : View
Products Affected
justsystems
- ichitaro_2022
CWE
CWE-416
Use After Free