Exploit:HTML/IESlice.BK exploits a vulnerability in an ActiveX control used by Xunlei Thunder 220.127.116.111.
Malicious or compromised websites use the exploit to download and execute arbitrary code.
Depending on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the suspect file, or ask you for a desired action.
More information on the scanning and removal options available in your F-Secure product can be found in the Help Center.
You may also refer to the Knowledge Base on the F-Secure Community site for more information.
Exploit:HTML/IESlice.BK is a script that exploits a heap-based buffer overflow in the PPlayer.XPPlayer.1 ActiveX control used by the pplayer.dll_1_work DLL of Xunlei Thunder 18.104.22.1681.
Sucessful exploitation allows the attacker to download and execute arbitrary code on the victim's computer.
Exploitation is done via a malicious webpage containing the detected script.
This vulnerability is under review as CVE-2007-6144.
Exploit:HTML/IESlice.BK will attempt to download a file from the following URL and execute it:
The URL was inactive during investigations.