We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
Exploit:Win32/Jdrop.gen!A
Detected by Microsoft Defender Antivirus
Aliases: CVE-2008-1092 (other) Trojan-Downloader.MSAccess.MsJet.a (Kaspersky) Exploit-MSJet (McAfee) Trojan/Mdrop-BQR (Sophos) Bloodhound.Exploit.183 (Symantec)
Summary
Exploit:Win32/Jdrop.gen!A is a generic detection for specially crafted Microsoft Access Database (MDB) files that exploit the Microsoft Jet Database Engine File Parsing Stack Overflow Vulnerability. This vulnerability is referenced by Common Vulnerabilities and Exposures ID CVE-2008-1092, and described in Microsoft Security Advisory 950267.
Manual removal is not recommended for this threat. To detect and remove this threat and other malicious software that may have been installed, run a full-system scan with an up-to-date antivirus product such as the Microsoft Safety Scanner (http://go.microsoft.com/fwlink/?LinkId=212742). For more information, see http://www.microsoft.com/protect/computer/viruses/vista.mspx.