Exploit:Java/ByteVerify.C is a detection of malicious code that attempts to exploit a vulnerability in the Microsoft Virtual Machine (VM) in order to download and execute arbitrary files on a user's machine. This vulnerability is addressed by update MS03-011, released in 2003.
Scan with antivirus software
Exploit:Java/ByteVerify.C downloads other malicious software to your computer. To recover from this additional malicious software, you must run a full-system scan with an up-to-date antivirus product. Several companies provide antivirus software for this purpose. For more information, see http://www.microsoft.com/athome/security/downloads/default.mspx.
Exploit:Java/ByteVerify.C is a detection of malicious code that attempts to exploit a vulnerability in the Microsoft Virtual Machine (VM). The VM enables Java programs to run on Windows platforms. The Microsoft Java VM is included in most versions of Windows and Internet Explorer.
In some versions of the Microsoft VM, a vulnerability exists because of a flaw in the way the ByteCode Verifier checks code when it is initially being loaded by the Microsoft VM. The ByteCode Verifier is a low level process in the Microsoft VM that is responsible for checking the validity of code - or byte code - as it is initially being loaded into the Microsoft VM.
Exploit:Java/ByteVerify.C attempts to download a file named "msits.exe", located in the same virtual directory as the Java applet, into the Windows system folder, and with a random file name. It then tries to execute this specific file.