This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
This signature detects attempts to exploit a buffer overflow vulnerability by passing long arguments into a method of Gretech GOM Player ActiveX control.
GOM Player is a media player for Windows.
The application is prone to a remote buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input before using it in an insufficiently sized buffer.
The problem occurs in the 'OpenUrl()' method of the GomWeb Control 'GomWeb3.dll' identified as CLSID: DC07C721-79E0-4BD4-A89F-C90871946A31.
Successfully exploiting this issue will allow an attacker to execute arbitrary code within the context of the application using the ActiveX control (typically Internet Explorer). Failed exploit attempts will result in a denial-of-service condition.
- This issue affects GOM Player 184.108.40.20699; other versions may also be vulnerable.