Vulnerability Note VU#251969
ICONICS Dialog Wrapper Module ActiveX control vulnerable to buffer overflow
ICONICS Dialog Wrapper Module ActiveX control contains a buffer overflow. This vulnerability may allow a remote attacker to execute arbitrary code on a vulnerable system.
OLE for Process Control (OPC) is a specification for a standard set of OLE COM objects for use in the process control and manufacturing fields. ICONICS provides OPC-based visualization software.
The ICONICS Dialog Wrapper Module ActiveX control is included with ICONICS OPC-enabled visualization tools, such as the Gauge, Switch, and Vessel ActiveX controls. The Dialog Wrapper Module ActiveX control fails to properly handle malformed input allowing a stack-based buffer overflow to occur.
By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message or attachment), an attacker may be able to execute arbitrary code with the privileges of the user. The attacker could also cause Internet Explorer (or the program using the WebBrowser control) to crash.
Apply Hot Fix
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Iconics, Inc.||Affected||04 Dec 2006||10 Jan 2007|
CVSS Metrics (Learn More)
This vulnerability was discovered and reported by Will Dormann. Thanks to ICONICS for working with us and quickly addressing this issue.
This document was written by Jeff Gennari.
- CVE IDs: CVE-2006-6488
- Date Public: 02 Jan 2007
- Date First Published: 02 Jan 2007
- Date Last Updated: 29 Oct 2009
- Severity Metric: 9.23
- Document Revision: 50
If you have feedback, comments, or additional information about this vulnerability, please send us email.