Vulnerability Note VU#251969

ICONICS Dialog Wrapper Module ActiveX control vulnerable to buffer overflow

Original Release date: 02 Jan 2007 | Last revised: 29 Oct 2009

Overview

ICONICS Dialog Wrapper Module ActiveX control contains a buffer overflow. This vulnerability may allow a remote attacker to execute arbitrary code on a vulnerable system.

Description

OLE for Process Control (OPC) is a specification for a standard set of OLE COM objects for use in the process control and manufacturing fields. ICONICS provides OPC-based visualization software.

The ICONICS Dialog Wrapper Module ActiveX control is included with ICONICS OPC-enabled visualization tools, such as the Gauge, Switch, and Vessel ActiveX controls. The Dialog Wrapper Module ActiveX control fails to properly handle malformed input allowing a stack-based buffer overflow to occur.

Exploit code for this vulnerability is publicly available.

Impact

By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message or attachment), an attacker may be able to execute arbitrary code with the privileges of the user. The attacker could also cause Internet Explorer (or the program using the WebBrowser control) to crash.

Solution

Apply Hot Fix
ICONICS has released a Hot Fix to fix this vulnerability. This Hot Fix contains DlgWrapper.dll version 8.4.166.0, which corrects this vulnerability. For a list of affected products, see the Hot Fix release notes.


Disable ActiveX

Disabling ActiveX controls in the Internet Zone (or any zone used by an attacker) appears to prevent exploitation of this and other ActiveX vulnerabilities. Instructions for disabling ActiveX in the Internet Zone can be found in the "Securing Your Web Browser" document. 

Disable the Dialog Wrapper Module object in Internet Explorer

The ICONICS Dialog Wrapper Module ActiveX control can be disabled in Internet Explorer by setting the kill bit for the following CLSID:

    {9D6BD878-B8EB-47E5-AB1C-87D74173BAAA}
More information about how to set the kill bit is available in Microsoft Support Document 240797.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Iconics, Inc.Affected04 Dec 200610 Jan 2007
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

This vulnerability was discovered and reported by Will Dormann. Thanks to ICONICS for working with us and quickly addressing this issue.

This document was written by Jeff Gennari.

Other Information

  • CVE IDs: CVE-2006-6488
  • Date Public: 02 Jan 2007
  • Date First Published: 02 Jan 2007
  • Date Last Updated: 29 Oct 2009
  • Severity Metric: 9.23
  • Document Revision: 50

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.