SolarWinds Application Monitor TSUnicodeGraphEditorControl factory Buffer Overflow Exploit Update

The specific flaw exists within the 'factory' object's loadExtensionFactory method. The issue lies in a failure to validate the size of an attacker-supplied input before copying it into a fixed-size buffer on the stack. An attacker can leverage this vulnerability to execute code under the context of the current process. This version add x86_64 support.
Exploit type: 
Vulnerabilty ID: 
Product Version: 
Released Date: 
Thursday, August 13, 2015 - 00:00