Follow:

 

Trojan:Java/Classloader.T


Trojan:Java/Classloader.T is the detection for a malicious Java applet that exploits the vulnerability described in CVE-2009-3867. The vulnerability is due to an error in the implementation of the HsbParser.getSoundBank function that can be exploited to result in a stack-based buffer overflow.


What to do now

Manual removal is not recommended for this threat. To detect and remove this threat and other malicious software that may have been installed, run a full-system scan with an up-to-date antivirus product such as Microsoft Security Essentials, or the Microsoft Safety Scanner. For more information about using antivirus software, see http://www.microsoft.com/security/antivirus/av.aspx.
Additional recovery instructions
This threat exploits a known vulnerability in Java software. After removing this threat, make sure that you install the updates available from the vendor. You can read more about this vulnerability from the following links:

Threat behavior

Trojan:Java/Classloader.T is the detection for a malicious Java applet that exploits the vulnerability described in CVE-2009-3867. The vulnerability is due to an error in the implementation of the HsbParser.getSoundBank function that can be exploited to result in a stack-based buffer overflow.
 
When a user visits a Web site that contains the applet while on a computer with a vulnerable version of Sun Java, security checks may be bypassed, allowing arbitrary code to be run.
 
When loaded, the applet determines what the operating system of the computer is. It then attempts to exploit the vulnerability by creating and running a file on the computer.
 
Trojan:Java/Classloader.T may also be detected as Exploit:Java/CVE-2009-3867.
 
Analysis by Patrik Vicol

Symptoms

Alert notifications or detections of this malware from installed antivirus or security software may be the only other symptom(s).

Prevention


Alert level: Severe
First detected by definition: 1.79.163.0
Latest detected by definition: 1.79.163.0 and higher
First detected on: Mar 19, 2010
This entry was first published on: Apr 22, 2010
This entry was updated on: Apr 17, 2011

This threat is also detected as:
  • Exploit.OSX.Smid.c (Kaspersky)
  • Java/ByteVerify!exploit (CA)
  • Exploit.Java.10 (Dr.Web)
  • OSX/Exploit.Smid.B (ESET)
  • Troj/Clsldr-U (Sophos)