Eng
  1. Skip to navigation
  2. Skip to content
  3. Skip to sidebar


Exploit:W32/JetDb.C


Aliases:


Exploit:W32/JetDb.C

Malware
Exploit
W32

Summary

This sample arrives together with a malicious MS Word document file as a package or attachment to email messages. The specially crafted file exploits a known Remote Code Execution vulnerability on Microsoft Jet Database Engine.



Disinfection & Removal

Automatic Disinfection

Allow F-Secure Anti-Virus to disinfect the relevant files.

For more general information on disinfection, please see Removal Instructions.



Technical Details

This malware file arrives as a package usually with another maliciously crafted MS Word Document file to be executed.

When loaded, this malware wil then exploit a known Remote-Code-Execution vulnerability on MS Jet Database Engine.

A successful execution of the exploit will result to the file C:\SVCH0ST.EXE to be created and executed on the user's system.







Submit a sample




Wondering if a file or URL is malicious? Submit a sample to our Lab for analysis via the Sample Analysis System (SAS)

Give And Get Advice




Give advice. Get advice. Share the knowledge on our free discussion forum.