This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
This signature detects attempt to exploit a buffer overflow vulnerbility by passing long arguments into a method of WebEx Meeting Manager ActiveX Control.
WebEx is file-sharing and conferencing software for Microsoft Windows.
The 'atucfobj' module of WebEx Meeting Manager is prone to a stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input.
This issue affects the 'NewObject()' method of the 'atucfobj.dll' ActiveX control library. The control is identified by CLSID: 32E26FD9-F435-4A20-A561-35D4B987CFDC.
An attacker can exploit this issue to execute arbitrary code in the context of an application using the affected ActiveX control (typically Internet Explorer). Failed attacks will likely cause denial-of-service conditions.
- 'atucfobj.dll' 20.2008.2601.4928 is vulnerable; other versions may also be affected.
Download and install any vendor patches related to this vulnerability.