search menu icon-carat-right cmu-wordmark

CERT Coordination Center

ICONICS Dialog Wrapper Module ActiveX control vulnerable to buffer overflow

Vulnerability Note VU#251969

Original Release Date: 2007-01-02 | Last Revised: 2009-10-29

Overview

ICONICS Dialog Wrapper Module ActiveX control contains a buffer overflow. This vulnerability may allow a remote attacker to execute arbitrary code on a vulnerable system.

Description

OLE for Process Control (OPC) is a specification for a standard set of OLE COM objects for use in the process control and manufacturing fields. ICONICS provides OPC-based visualization software.

The ICONICS Dialog Wrapper Module ActiveX control is included with ICONICS OPC-enabled visualization tools, such as the Gauge, Switch, and Vessel ActiveX controls. The Dialog Wrapper Module ActiveX control fails to properly handle malformed input allowing a stack-based buffer overflow to occur.

Exploit code for this vulnerability is publicly available.

Impact

By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message or attachment), an attacker may be able to execute arbitrary code with the privileges of the user. The attacker could also cause Internet Explorer (or the program using the WebBrowser control) to crash.

Solution

Apply Hot Fix
ICONICS has released a Hot Fix to fix this vulnerability. This Hot Fix contains DlgWrapper.dll version 8.4.166.0, which corrects this vulnerability. For a list of affected products, see the Hot Fix release notes.


Disable ActiveX

Disabling ActiveX controls in the Internet Zone (or any zone used by an attacker) appears to prevent exploitation of this and other ActiveX vulnerabilities. Instructions for disabling ActiveX in the Internet Zone can be found in the "Securing Your Web Browser" document. 

Disable the Dialog Wrapper Module object in Internet Explorer

The ICONICS Dialog Wrapper Module ActiveX control can be disabled in Internet Explorer by setting the kill bit for the following CLSID:

{9D6BD878-B8EB-47E5-AB1C-87D74173BAAA}
More information about how to set the kill bit is available in Microsoft Support Document 240797.

Vendor Information

251969
 

Iconics, Inc. Affected

Notified:  December 04, 2006 Updated: January 10, 2007

Status

Affected

Vendor Statement

ICONICS is dedicated to continuous improvement of product quality and reliability.

Background
The ICONICS Dialog Wrapper Module ActiveX control is included with ICONICS OPC-enabled visualization tools, such as the Gauge, Switch, and Vessel ActiveX controls. Under very specific conditions, this control allows a stack-based buffer overflow to occur.

Resolution
Immediately after being alerted to this vulnerability, ICONICS issued a hot fix to address this issue. It can be downloaded via the link below. It is recommended that all users apply the hot fix provided or disable the ICONICS Dialog Wrapper Module ActiveX control in Internet Explorer.

This hot fix (for all versions and applications) can be downloaded here:
http://www.iconics.com/support/free_tools/FreeToolsActiveX_DlgWrapperHotFix.zip.

The ICONICS Dialog Wrapper Module ActiveX control can be disabled in Internet Explorer by setting the kill bit for the following CLSID:
{9D6BD878-B8EB-47E5-AB1C-87D74173BAAA}
More information about how to set the kill bit is available in Microsoft Support Document 240797.

If you have any questions related to this notification please contact the Global Support & Services team at support@iconics.com.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Addendum

Refer to the release notes included in http://www.iconics.com/support/free_tools/FreeToolsActiveX_DlgWrapperHotFix.zip.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was discovered and reported by Will Dormann. Thanks to ICONICS for working with us and quickly addressing this issue.

This document was written by Jeff Gennari.

Other Information

CVE IDs: CVE-2006-6488
Severity Metric: 9.23
Date Public: 2007-01-02
Date First Published: 2007-01-02
Date Last Updated: 2009-10-29 14:16 UTC
Document Revision: 50

Sponsored by CISA.