This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
This signature detects attempts to exploit a buffer overflow vulnerability in Zenturi ProgramChecker.
Zenturi ProgramChecker is a suite of utilities for analyzing programs running on a Windows computer.
The application is prone to a stack-based buffer-overflow vulnerability because it fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer.
This issue occurs when excessive data is passed to the 'Fill' method of the 'sasatl.dll' library.
This issue resides in the ActiveX control with CLSID:7D6B5B29-FC7E-11D1-9288-00104B885781.
Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed exploit attempts likely result in denial-of-service conditions.
ProgramChecker 18.104.22.1681 is vulnerable; other versions may also be affected.
- Zenturi Zenturi ProgramChecker ActiveX Control 1.5.531