Stack-based buffer overflow in the DoModal function in the Dialog Wrapper Module ActiveX control (DlgWrapper.dll) before 8.4.166.0, as used by ICONICS OPC Enabled Gauge, Switch, and Vessel ActiveX, allows remote attackers to execute arbitrary code via a long (1) FileName or (2) Filter argument.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/21849 | vdb entry |
http://www.kb.cert.org/vuls/id/251969 | third party advisory us government resource |
http://osvdb.org/32552 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/31228 | vdb entry |
http://secunia.com/advisories/23583 | third party advisory vendor advisory |
http://www.vupen.com/english/advisories/2007/0025 | vdb entry |