This indicates an attempt to exploit a buffer-overflow vulnerability in W32Dasm, a disassembler/debugger developed by URSoft.
The program uses the wsprintf() function to copy the name of the
imported/exported functions of the analyzed file into a buffer of only
256 bytes, with the possibility for an attacker to execute malicious
W32Dasm 8.93 and earlier version.
Operating system : windows xp sp0.
System Compromise: Remote attackers can gain control of vulnerable systems.
Currently, we are not aware of any patch officially released by the vendor for this issue.