Home / malware Exploit:Win32/Pdfjsc.AS
First posted on 18 June 2009.
Source: SecurityHomeAliases :
Exploit:Win32/Pdfjsc.AS is also known as Also Known As:Mal/PdfEx-C (Sophos), Exploit.PDF-JS.Gen (BitDefender), Exploit-PDF.b.gen (McAfee).
Explanation :
Exploit:Win32/Pdfjsc.AS is a detection for specially-crafted PDF files that attempt to exploit software vulnerabilities in Adobe Acrobat and Adobe Reader. It usually arrives in the system when the user visits a Web page that contains a malicious PDF file or opens an e-mail message containing the PDF file as an attachment.
Symptoms
There are no common symptoms associated with this threat. Alert notifications from installed antivirus software may be the only symptom(s).
Exploit:Win32/Pdfjsc.AS is a detection for specially-crafted PDF files that attempt to exploit software vulnerabilities in Adobe Acrobat and Adobe Reader. These PDF files contain an embedded JavaScript that, when loaded (as when the files are opened in a vulnerable version of Adobe Acrobat or Adobe Reader) executes a shellcode that exploits the vulnerabilities. The shellcode may perform any action, such as downloading and running other malware. Exploit:Win32/Pdfjsc.AS usually arrives in the system when the user visits a Web page that contains a malicious PDF file or opens an e-mail message containing the PDF file as an attachment. The vulnerabilities it attempts to exploit are the following:CVE-2007-5659 CVE-2008-2992 CVE-2009-0927
Analysis by Shawn WangLast update 18 June 2009