ICONICS Dialog Wrapper Module ActiveX control contains a buffer overflow. This vulnerability may allow a remote attacker to execute arbitrary code on a vulnerable system.
OLE for Process Control (OPC) is a specification for a standard set of OLE COM objects for use in the process control and manufacturing fields. ICONICS provides OPC-based visualization software.
The ICONICS Dialog Wrapper Module ActiveX control is included with ICONICS OPC-enabled visualization tools, such as the Gauge, Switch, and Vessel ActiveX controls. The Dialog Wrapper Module ActiveX control fails to properly handle malformed input allowing a stack-based buffer overflow to occur.
By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message or attachment), an attacker may be able to execute arbitrary code with the privileges of the user. The attacker could also cause Internet Explorer (or the program using the WebBrowser control) to crash.
Apply Hot Fix
This vulnerability was discovered and reported by Will Dormann. Thanks to ICONICS for working with us and quickly addressing this issue.
This document was written by Jeff Gennari.
|Date First Published:||2007-01-02|
|Date Last Updated:||2009-10-29 14:16 UTC|