This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
This signature detects attempt to exploit buffer overflow vulnerability through 'DownloadCert()', 'DecryptFileByKey()' and 'EncryptFileByKey()' methods of SignKorea SKCrypAX ActiveX control.
SignKorea SKCrypAX ActiveX control is a web-based component for the SignKorea SKCrypAX application.
SignKorea SKCrypAX ActiveX control is prone to multiple remote buffer-overflow vulnerabilities because the software fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. Specifically, these occur when passing excessively long strings to the 'DownloadCert()', 'DecryptFileByKey()' and 'EncryptFileByKey()' functions.
Exploiting these issues allows remote attackers to execute arbitrary code in the context of applications using the affected ActiveX control and to compromise affected computers. Failed attempts will likely result in denial-of-service conditions.
These issues affect SKCrypAX 126.96.36.199; other versions may also be affected.
- SignKorea SKCrypAX 188.8.131.52
Reports indicate that this issue may have been fixed in the most current version of the affected application. Symantec has not confirmed this.
Ensure that all patches supplied by the vendor have been applied. Upgrade to the latest version of SignKorea SKCrypAX.