First published: Sun Dec 31 2006(Updated: )
Stack-based buffer overflow in the DoModal function in the Dialog Wrapper Module ActiveX control (DlgWrapper.dll) before 8.4.166.0, as used by ICONICS OPC Enabled Gauge, Switch, and Vessel ActiveX, allows remote attackers to execute arbitrary code via a long (1) FileName or (2) Filter argument.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Iconics Dialog Wrapper Module Activex Control | <=8.4.165.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.