Exploit.JS.ADODB.Stream

Classification

Category :

Malware

Type :

Exploit

Aliases :

Exploit.JS.ADODB.Stream, Exploit.JS.ADODB.Stream

Summary

Exploit.JS.ADODB.Stream is a generic detection name given to all Java Script programs that uses known exploits in Internet Explorer combined with the use of ADODB.Stream functionality in ActiveX. It contains a code that uses a vulnerability in the Internet Explorer to execute.

Removal

Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.

A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:

  • Check for the latest database updates

    First check if your F-Secure security program is using the latest updates, then try scanning the file again.

  • Submit a sample

    After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.

    Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.

  • Exclude a file from further scanning

    If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.

    Note: You need administrative rights to change the settings.

Technical Details

Exploit.JS.ADODB.Stream is a detection name given to all Java Script programs that use known exploits in Internet Explorer combined with the use of ADODB.Stream functionality in ActiveX. These java script trojans, which are usually embedded within websites, use known vulnerabilities that allow remote code execution of potentially malicious files.

It may arrive on the system upon access to malicious websites. It may also be spammed through links that arrive via instant messenging applications, which is propagated by another malware. One example of which is AutoIt.X, a trojan that spams links of malicious websites to contacts in Yahoo! Messenger. These malicious sites are all detected as Exploit.JS.ADODB.Stream.e.

Exploit.JS.ADODB.Stream script trojans takes advantage of the ADODB.Stream object in ActiveX, which contains methods for reading and writing files. A malicious site can use this functionality combined with known vulnerabilities in Internet Explorer to allow remote code execution in an infected machine. Using a vulnerable web browser, access to malicious websites, detected as a variant of Exploit.JS.ADODB.Stream, will automatically download other malware and execute it onto the user's system.

Below is one of the vulnerabilities in Internet Explorer that can be used with ADODB.Stream object functionality to exploit a machine:

  • Navigation Method Cross-Domain Vulnerability - CAN-2004-0549 ( MS04-025)