CVE-2006-6488
Summary
| CVE | CVE-2006-6488 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2006-12-31 05:00:00 UTC |
| Updated | 2017-07-29 01:29:00 UTC |
| Description | Stack-based buffer overflow in the DoModal function in the Dialog Wrapper Module ActiveX control (DlgWrapper.dll) before 8.4.166.0, as used by ICONICS OPC Enabled Gauge, Switch, and Vessel ActiveX, allows remote attackers to execute arbitrary code via a long (1) FileName or (2) Filter argument. |
Risk And Classification
Problem Types: NVD-CWE-Other
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Iconics | Dialog Wrapper Module Activex Control | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| ICONICS Dialog Wrapper Module ActiveX Control Buffer Overflow - Advisories - Secunia | SECUNIA | secunia.com | Vendor Advisory |
| IBM X-Force Exchange | XF | exchange.xforce.ibmcloud.com | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | |
| VU#251969 - ICONICS Dialog Wrapper Module ActiveX control vulnerable to buffer overflow | CERT-VN | www.kb.cert.org | Third Party Advisory, US Government Resource |
| ICONICS Dialog Wrapper Module ActiveX Control Remote Stack Buffer Overflow Vulnerability | BID | www.securityfocus.com | |
| 32552 | OSVDB | osvdb.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.