Stack-based buffer overflow in the DoModal function in the Dialog Wrapper Module ActiveX control (DlgWrapper.dll) before 8.4.166.0, as used by ICONICS OPC Enabled Gauge, Switch, and Vessel ActiveX, allows remote attackers to execute arbitrary code via a long (1) FileName or (2) Filter argument.
References
Link | Resource |
---|---|
http://www.kb.cert.org/vuls/id/251969 | Third Party Advisory US Government Resource |
http://secunia.com/advisories/23583 | Vendor Advisory |
http://www.securityfocus.com/bid/21849 | |
http://osvdb.org/32552 | |
http://www.vupen.com/english/advisories/2007/0025 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/31228 |
Configurations
Information
Published : 2006-12-30 21:00
Updated : 2017-07-28 18:29
NVD link : CVE-2006-6488
Mitre link : CVE-2006-6488
JSON object : View
CWE
Products Affected
iconics
- dialog_wrapper_module_activex_control