I think, correct me if I am wrong, this exploit was available in Crimepack since at least 2.2.1 , not sure if this is from 2.2.1 or 2.8
File gsb50 received on 2010.05.14 02:44:37 (UTC)
http://www.virustotal.com/analisis/44916e0b40e2b8709a89f1209cceffab9a9bf8e26296ff85236cadd7d7a76258-1273805077
Result: 18/40 (45%)
AhnLab-V3 2010.05.14.00 2010.05.13 JAVA/Exploit
AntiVir 8.2.1.242 2010.05.13 EXP/Java.WebStart
Antiy-AVL 2.0.3.7 2010.05.13 Exploit/Java.CVE-2009-3867
AVG 9.0.0.787 2010.05.13 Generic2_c.XRX
DrWeb 5.0.2.03300 2010.05.14 Exploit.Java.27
eSafe 7.0.17.0 2010.05.13 Win32.Exploit.ByteVe
Ikarus T3.1.1.84.0 2010.05.14 Exploit.Java.WebStart
Kaspersky 7.0.0.125 2010.05.14 Exploit.Java.CVE-2009-3867.b
McAfee 5.400.0.1158 2010.05.14 Exploit-ByteVerify
McAfee-GW-Edition 2010.1 2010.05.13 Exploit-ByteVerify
NOD32 5113 2010.05.13 OSX/Exploit.Smid.B
Norman 6.04.12 2010.05.13 JAVA/CrimePack.gen
PCTools 7.0.3.5 2010.05.14 Trojan.Generic
Sophos 4.53.0 2010.05.14 Exp/WebStart-A
Sunbelt 6301 2010.05.14 Trojan.Java.Webstart.a (v)
Symantec 20101.1.0.89 2010.05.14 Trojan Horse -laconic, as usual .. but nothing wrong with it, this covers most them anyway (M)
TrendMicro 9.120.0.1004 2010.05.13 JAVA_WEBSTART.A
TrendMicro-HouseCall 9.120.0.1004 2010.05.14 JAVA_WEBSTART.A
Additional information
File size: 2909 bytes
MD5...: 95f3ec9b3bb5e1792fd604eb6a0b5af0
No comments:
Post a Comment