First published: Fri May 13 2011(Updated: )
Stack-based buffer overflow in the SetActiveXGUID method in the VersionInfo ActiveX control in GenVersion.dll 8.0.138.0 in the WebHMI subsystem in ICONICS BizViz 9.x before 9.22 and GENESIS32 9.x before 9.22 allows remote attackers to execute arbitrary code via a long string in the argument. NOTE: some of these details are obtained from third party information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ICONICS BizViz | =9.0 | |
ICONICS BizViz | =9.2 | |
ICONICS BizViz | =9.20 | |
ICONICS BizViz | =9.01 | |
ICONICS BizViz | =9.1 | |
ICONICS BizViz | =9.21 | |
ICONICS BizViz | =9.13 | |
ICONICS GENESIS32 | =9.0 | |
ICONICS GENESIS32 | =9.20 | |
ICONICS GENESIS32 | =9.21 | |
ICONICS GENESIS32 | =9.1 | |
ICONICS GENESIS32 | =9.13 | |
ICONICS GENESIS32 | =9.01 | |
ICONICS GENESIS32 | =9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2089 has a high severity due to the potential for remote code execution.
To fix CVE-2011-2089, update your ICONICS BizViz or GENESIS32 software to version 9.22 or later.
CVE-2011-2089 affects users of ICONICS BizViz versions 9.0, 9.01, 9.1, 9.2, 9.13, 9.20, 9.21 and GENESIS32 versions 9.0, 9.01, 9.1, 9.2, 9.13, 9.20, 9.21.
CVE-2011-2089 is a stack-based buffer overflow vulnerability.
Yes, CVE-2011-2089 can be exploited remotely by sending a specially crafted long string to the vulnerable ActiveX control.