This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the WebGate WebEyeAudio ActiveX control. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the Connect method provided by the control. By providing a malicious value, an attacker is able to overflow a static buffer on the stack, and could execute arbitrary code in the context of the browser.