Exploit.JS.ADODB.Stream is a generic detection name given to all Java Script programs that uses known exploits in Internet Explorer combined with the use of ADODB.Stream functionality in ActiveX. It contains a code that uses a vulnerability in the Internet Explorer to execute.
Depending on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the suspect file, or ask you for a desired action.
More information on the scanning and removal options available in your F-Secure product can be found in the Help Center.
You may also refer to the Knowledge Base on the F-Secure Community site for more information.
Exploit.JS.ADODB.Stream is a detection name given to all Java Script programs that use known exploits in Internet Explorer combined with the use of ADODB.Stream functionality in ActiveX. These java script trojans, which are usually embedded within websites, use known vulnerabilities that allow remote code execution of potentially malicious files.
It may arrive on the system upon access to malicious websites. It may also be spammed through links that arrive via instant messenging applications, which is propagated by another malware. One example of which is AutoIt.X, a trojan that spams links of malicious websites to contacts in Yahoo! Messenger. These malicious sites are all detected as Exploit.JS.ADODB.Stream.e.
Exploit.JS.ADODB.Stream script trojans takes advantage of the ADODB.Stream object in ActiveX, which contains methods for reading and writing files. A malicious site can use this functionality combined with known vulnerabilities in Internet Explorer to allow remote code execution in an infected machine. Using a vulnerable web browser, access to malicious websites, detected as a variant of Exploit.JS.ADODB.Stream, will automatically download other malware and execute it onto the user's system.
Below is one of the vulnerabilities in Internet Explorer that can be used with ADODB.Stream object functionality to exploit a machine:
Detection Type: Mobile