Overview
ICONICS Dialog Wrapper Module ActiveX control contains a buffer overflow. This vulnerability may allow a remote attacker to execute arbitrary code on a vulnerable system.
Description
OLE for Process Control (OPC) is a specification for a standard set of OLE COM objects for use in the process control and manufacturing fields. ICONICS provides OPC-based visualization software. The ICONICS Dialog Wrapper Module ActiveX control is included with ICONICS OPC-enabled visualization tools, such as the Gauge, Switch, and Vessel ActiveX controls. The Dialog Wrapper Module ActiveX control fails to properly handle malformed input allowing a stack-based buffer overflow to occur. |
Impact
By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message or attachment), an attacker may be able to execute arbitrary code with the privileges of the user. The attacker could also cause Internet Explorer (or the program using the WebBrowser control) to crash. |
Solution
Apply Hot Fix |
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://www.iconics.com/support/free_tools/FreeToolsActiveX_DlgWrapperHotFix.zip
- http://www.iconics.com/support/free_tools.asp
- http://www.iconics.com/support/readme_file.asp?file=195
- http://secunia.com/advisories/23583/
- http://www.digitalmunition.com/iconics_dlgwrapper.rb
- http://www.milw0rm.com/exploits/6570
Acknowledgements
This vulnerability was discovered and reported by Will Dormann. Thanks to ICONICS for working with us and quickly addressing this issue.
This document was written by Jeff Gennari.
Other Information
CVE IDs: | CVE-2006-6488 |
Severity Metric: | 9.23 |
Date Public: | 2007-01-02 |
Date First Published: | 2007-01-02 |
Date Last Updated: | 2009-10-29 14:16 UTC |
Document Revision: | 50 |