JS_EXPLOIT.SM1
October 08, 2012
PLATFORM:
Windows 2000, Windows XP, Windows Server 2003
OVERALL RISK RATING:
DAMAGE POTENTIAL:
DISTRIBUTION POTENTIAL:
REPORTED INFECTION:

Threat Type: Trojan
Destructiveness: No
Encrypted: Yes
In the wild: Yes
OVERVIEW
It takes advantage of the Use-after-free vulnerability in the Peer Objects component in Microsoft Internet Explorer to download possibly malicious files.
This Trojan may be hosted on a website and run when a user accesses the said website.
As of this writing, the said sites are inaccessible.
TECHNICAL DETAILS
File Size:
Varies
File Type:
HTML, HTM
Memory Resident:
No
Initial Samples Received Date:
29 Nov 2010
Payload:
Disables services
Arrival Details
This Trojan may be hosted on a website and run when a user accesses the said website.
Download Routine
This Trojan takes advantage of the following software vulnerabilities to download possibly malicious files: