This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
This signature detects an attempt to exploit a buffer overflow vulnerability in SasCam Webcam Server ActiveX control.
SasCam Webcam Server is a web-camera application available for Microsoft Windows.
The application is prone to a buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it into an insufficiently sized memory buffer. The vulnerability affects the 'Get()' method of the ActiveX control identified by CLSID:
An attacker can exploit this issue to execute arbitrary code within the context of the application that uses the ActiveX control (typically Internet Explorer). Failed exploit attempts will result in denial-of-service conditions.
SasCam Webcam Server 2.6.5 is vulnerable; other versions may also be affected.
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: email@example.com.