A program or technique that takes advantage of a vulnerability to remotely access or attack a program, computer or server.
Disinfection & Removal
Exploit:W32/PDFExploit.G is distributed in a maliciously-crafted PDF file and exploits a vulnerability (CVE-2010-0188) in Adobe Reader program to open a connection to a remote website.
For more information about the vulnerability, please see:
- http://www.adobe.com/support/security/bulletins/apsb10-07.html (external site)
When the malicious PDF file is executed, a downloader is dropped on the computer and attempts to open a connection to: