1. Symantec/
  2. Security Response/
  3. Attack Signatures/
  4. Web Attack: Gom Player CVE-2007-5779

Web Attack: Gom Player CVE-2007-5779

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.


This signature detects attempts to exploit a buffer overflow vulnerability by passing long arguments into a method of Gretech GOM Player ActiveX control.

Additional Information

GOM Player is a media player for Windows.

The application is prone to a remote buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input before using it in an insufficiently sized buffer.

The problem occurs in the 'OpenUrl()' method of the GomWeb Control 'GomWeb3.dll' identified as CLSID: DC07C721-79E0-4BD4-A89F-C90871946A31.

Successfully exploiting this issue will allow an attacker to execute arbitrary code within the context of the application using the ActiveX control (typically Internet Explorer). Failed exploit attempts will result in a denial-of-service condition.


  • This issue affects GOM Player; other versions may also be vulnerable.
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube