Skip to main content
Skip to main content
Published Apr 03, 2012 | Updated Sep 15, 2017

Exploit:Java/CVE-2010-0840.QG

Detected by Microsoft Defender Antivirus

Aliases: Exploit.Java.CVE-2011-3544.na (Kaspersky) Exploit.Java.CVE-2010-0840.v (BitDefender) Exploit.CVE2010-0840.63 (Dr.Web) Java/Exploit.CVE-2011-3544.BG trojan (ESET)

Summary

Exploit:Java/CVE-2010-0840.QG is a malicious and obfuscated Java class that exploits the vulnerability described in CVE-2010-0840. Successful exploitation may lead to the downloading and execution of arbitrary files under the user's security context. When a user visits a website that contains this malicious Java class using a computer that has a vulnerable version of Java, security checks may be bypassed, which allows arbitrary code execution.

To detect and remove this threat and other malicious software that may be installed on your computer, run a full-system scan with an appropriate, up-to-date, security solution. The following Microsoft products detect and remove this threat:

For more information on antivirus software, see http://www.microsoft.com/windows/antivirus-partners/.

Update vulnerable applications

This threat exploits a known vulnerability in the Java Runtime Environment (JRE). To prevent your computer from being vulnerable to this malware, make sure that you install the updates available from the vendor. You can read more about this vulnerability from the following links:

It may be necessary to remove older versions of Java that are still present. Keeping old and unsupported versions of Java on your system presents a serious security risk. To read more about why you should remove older versions of Java, see the following information.

Additional removal instructions

These threats may be present in your Temporary Internet Files folder. We recommend that you delete your temporary Internet files to prevent the persistent detection of this threat from within the Temporary Internet Files folder.

To delete the temporary Internet files from Internet Explorer, refer to the following articles:

Follow us