We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
Exploit:Win32/Jdrop.gen!B
Detected by Microsoft Defender Antivirus
Aliases: Trojan.Downloader.Agent.YFZ (BitDefender) Trojan-Dropper.MSWord.1Table.fd (Kaspersky) Exploit-1Table.a (McAfee)
Summary
Exploit:Win32/Jdrop.gen!B is a generic detection for specially crafted Microsoft Document (DOC) files that open Microsoft Access Database (MDB) files to exploit the Microsoft Jet Database Engine File Parsing Stack Overflow Vulnerability. This vulnerability is referenced by Common Vulnerabilities and Exposures ID CVE-2008-1092, and described in Microsoft Security Advisory 950267.
Manual removal is not recommended for this threat. Use Microsoft Security Essentials or another up-to-date scanning and removal tool to detect and remove this threat and other unwanted software from your computer. For more information on Microsoft security products, see http://www.microsoft.com/protect/products/computer/default.mspx.