Exploit:Win32/Pdfjsc
Microsoft security software detects and removes these threats.
Win32/Pdfjsc are a family of malicious PDF files that exploit vulnerabilities in Adobe Acrobat and Adobe Reader.
The vulnerabilities allow malware to download and run arbitrary files.
Win32/Pdfjsc
Microsoft security software detects and removes these threats.
This malware family exploit vulnerabilities in Adobe Acrobat and Adobe Reader.
The vulnerabilities allow malware to download and run files, inlcuding other malware.
Exploit:Win32/Pdfjsc.H
Exploit:Win32/Pdfjsc.X
Exploit:Win32/Pdfjsc.GR
-
CVE-2009-0927 - the "Collab.getIcon" method
-
CVE-2008-2992 - the "util.printf" method
-
CVE-2007-5659 - the "Collab.collectEmailInfo" method
Exploit:Win32/Pdfjsc.OL
Exploit:Win32/Pdfjsc.OL is the detection for malicious Portable Document Format (PDF) files that contain an obfuscated JavaScript. These files exploit a vulnerability in Adobe Acrobat and Adobe Reader that allows it to download and execute arbitrary files. The vulnerability is discussed in the following links:
Exploit:Win32/Pdfjsc.YX
Exploit:Win32/Pdfjsc.YX is a specially-crafted JavaScript, which exploits a vulnerability in the Java Runtime Environment, Adobe Acrobat, and Adobe Reader discussed in the following articles:
Exploit:Win32/Pdfjsc.ADM
Exploit:Win32/Pdfjsc.ADM is a malicious PDF file that exploits a vulnerability in Adobe Acrobat and Adobe Reader.
The vulnerabilities, discussed in CVE-2010-0188, allow this malware to download and run arbitrary files.
Exploit:Win32/Pdfjsc.FN
Exploit:Win32/Pdfjsc.FU
Exploit:Win32/Pdfjsc.HW
Exploit:Win32/Pdfjsc.BC
Windows Defender detects and removes this threat.
This threat uses a vulnerability in some Adobe products to download and run files on your PC, including other malware.
It can run if you have a vulnerable version of Adobe on your PC and you visit a malicious website, or open a malicious PDF document attached to an email.
The following versions of Adobe Reader and Acrobat are vulnerable:
- 9.x before 9.5.5
- 10.x before 10.1.7
- 11.x before 11.0.03
You may get an alert about this threat even if you're not using a vulnerable software version. This is because we detect when an attempt is made to exploit this vulnerability, even if it isn't successful.
You can find more information about this threat on the CVE website or our page about exploits.
Exploit:Win32/Pdfjsc.AU
Windows Defender detects and removes this threat.
This threat uses an Adobe vulnerability to download and run files on your PC, including malware.
It runs when you open an infected PDF file and you have a vulnerable version of Adobe Reader or Acrobat. You might receive this PDF file as an email attachment.
The following versions of Adobe Reader/Acrobat are vulnerable:
- Adobe Acrobat and Adobe Reader version 11 earlier than 11.0.03
- Adobe Acrobat and Adobe Reader version 10 earlier than 10.1.7
- Adobe Acrobat and Adobe Reader version 9 earlier than 9.5.5
Exploit:Win32/Pdfjsc.DE
Exploit:Win32/Pdfjsc.QB
Exploit:Win32/Pdfjsc.QB is the detection for specially-crafted PDF files that attempt to exploit software vulnerabilities in Adobe Acrobat and Adobe Reader that could result in the execution of arbitrary code. The vulnerability is discussed in the following articles:
Exploit:Win32/Pdfjsc.G
Exploit:Win32/Pdfjsc.KG
Exploit:Win32/Pdfjsc.ZZ
Exploit:Win32/Pdfjsc.ZZ is a detection for a PDF file that contains an obfuscated malicious JavaScript that attempts to contact remote hosts in order to download arbitrary files.
Exploit:Win32/Pdfjsc.ALA
Windows Defender detects and removes this threat.
Exploit:Win32/Pdfjsc.ALA is a specially created PDF file that exploits a vulnerability in Adobe Acrobat and Adobe Reader.
The vulnerability, discussed in CVE-2010-0188, lets this file download and run other files, which might be other malware.
These versions of Adobe Acrobat and Adobe Reader are vulnerable to this exploit:
- Adobe Acrobat and Adobe Reader version 8 earlier than 8.2.1
- Adobe Acrobat and Adobe Reader version 9 earlier than 9.3.1