Eng
  1. Skip to navigation
  2. Skip to content
  3. Skip to sidebar


Exploit.CodeBaseExec


Aliases:


Exploit.CodeBaseExec
CodeBaseExec

Malware

W32

Summary

Warning on "Exploit.CodeBaseExec" means that HTML page being scanned contains code exploiting the Microsoft Internet Explorer Arbitrary Program Execution Vulnerability, aka the Local Executable Invocation via Object tag vulnerability.

Many suspicious websites use this vulnerability to try do gain access to the local computer.



Disinfection & Removal

Automatic Disinfection

Allow F-Secure Anti-Virus to disinfect the relevant files.

For more general information on disinfection, please see Removal Instructions.



Technical Details

Microsoft Internet Explorer 5.01, 5.5 and 6.0 treat objects invoked on an HTML page with the codebase property as part of the Local Computer zone, which allows remote attacks to invoke executables present on the local system through objects such as the popup object.

More information on this vulnerability can be found from: http://www.microsoft.com/technet/security/bulletin/ms02-015.asp?frame=true#CV...

Microsoft released a patch on March 28, 2002 that eliminates this vulnerability in Internet Explorer. To download this patch go to the following link: http://www.microsoft.com/windows/ie/downloads/critical/Q319182/default.asp





Description Created: Kaspersky Lab



Submit a sample




Wondering if a file or URL is malicious? Submit a sample to our Lab for analysis via the Sample Analysis System (SAS)

Give And Get Advice




Give advice. Get advice. Share the knowledge on our free discussion forum.