Also known as a trojan horse program, this is a deceptive program that performs additional actions without the user's knowledge or permission. It does not replicate.
Trojan:W32/PFV-Exploit is a detection for files containing an exploit for a vulnerability in Windows WMF (Windows Metafile) handling. The vulnerability may be exploited either locally or remotely, if an attacker can trick the user into viewing a specially crafted WMF file. Possible attack scenarios are:
When user visits malicious web site containing a specially crafted WMF file
When user views malicious WMF file (locally or network share)
When user opens email containing malicious WMF
A new exploit targeting this vulnerability was found in the wild in December 28th 2005.
According to Microsoft, the following versions of Windows are affected by the flaw: