JustSystems Ichitaro 2005 through 2011, Ichitaro Government 6, Ichitaro Government 2006 through 2010, Ichitaro Portable, Ichitaro Pro, and Ichitaro Viewer allow remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted document, as exploited in the wild in early 2011.
jvn.jp/en/jp/JVN87239473/index.html
jvndb.jvn.jp/jvndb/JVNDB-2011-000043
secunia.com/advisories/44956
www.justsystems.com/jp/info/js11001.html
www.securityfocus.com/bid/48283
www.symantec.com/connect/blogs/targeted-attacks-2011-using-ichitaro-zero-day-vulnerability
exchange.xforce.ibmcloud.com/vulnerabilities/68072