Home > Threat descriptions >

Exploit:W32/JetDb.C

Classification

Category: Malware

Type: Exploit

Aliases: Exploit:W32/JetDb.C

Summary


This sample arrives together with a malicious MS Word document file as a package or attachment to email messages. The specially crafted file exploits a known Remote Code Execution vulnerability on Microsoft Jet Database Engine.

Removal


Automatic action

Based on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the detected program or file, or ask you for a desired action.

Knowledge Base

Find the latest advice in our Community Knowledge Base.

About the product

See the manual for your F-Secure product on the Help Center.

Contact Support

Chat with or call an expert for help.

Submit a sample

Submit a file or URL for further analysis.

Technical Details


This malware file arrives as a package usually with another maliciously crafted MS Word Document file to be executed.

When loaded, this malware wil then exploit a known Remote-Code-Execution vulnerability on MS Jet Database Engine.

A successful execution of the exploit will result to the file C:\SVCH0ST.EXE to be created and executed on the user's system.