Exploit.JS.ADODB.Stream is a generic detection name given to all Java Script programs that uses known exploits in Internet Explorer combined with the use of ADODB.Stream functionality in ActiveX. It contains a code that uses a vulnerability in the Internet Explorer to execute.
Disinfection & Removal
Allow F-Secure Anti-Virus to disinfect the relevant files.
For more general information on disinfection, please see Removal Instructions.
Exploit.JS.ADODB.Stream is a detection name given to all Java Script programs that use known exploits in Internet Explorer combined with the use of ADODB.Stream functionality in ActiveX. These java script trojans, which are usually embedded within websites, use known vulnerabilities that allow remote code execution of potentially malicious files.
It may arrive on the system upon access to malicious websites. It may also be spammed through links that arrive via instant messenging applications, which is propagated by another malware. One example of which is AutoIt.X, a trojan that spams links of malicious websites to contacts in Yahoo! Messenger. These malicious sites are all detected as Exploit.JS.ADODB.Stream.e.
Exploit.JS.ADODB.Stream script trojans takes advantage of the ADODB.Stream object in ActiveX, which contains methods for reading and writing files. A malicious site can use this functionality combined with known vulnerabilities in Internet Explorer to allow remote code execution in an infected machine. Using a vulnerable web browser, access to malicious websites, detected as a variant of Exploit.JS.ADODB.Stream, will automatically download other malware and execute it onto the user's system.
Below is one of the vulnerabilities in Internet Explorer that can be used with ADODB.Stream object functionality to exploit a machine:
- Navigation Method Cross-Domain Vulnerability - CAN-2004-0549 ( MS04-025)
Detection Type: Mobile