This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
This signature detects attempts to exploit a buffer overflow vulnerability in Iconics Dialog Wrapper.
ICONICS Dialog Wrapper Module ActiveX control is included with ICONICS OPC-enabled visualization applications.
The control is prone to an unspecified remote stack-based buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied input data to an insufficiently sized buffer.
An attacker can exploit this issue to execute arbitrary code with the privileges of the victim user. Failed attempts can crash the host application.
- ICONICS, Inc. Dialog Wrapper Module ActiveX Control
The vendor has released a fix to address this issue. Please see the references for more information.
ICONICS, Inc. Dialog Wrapper Module ActiveX ControlFreeToolsActiveX_DlgWrapperHotFix.zip