Win32/Rustock.A!gen
Win32/Rustock.B!gen
Win32/CVE-2012-0158
Windows Defender detects and removes this threat.
This threat uses a vulnerability to download and run files on your PC, including other malware. It is also called the "MSCOMCTL.OCX RCE Vulnerability".
It runs if you visit a web site, use a Microsoft Office document or .rtf file (Word document), and have a vulnerable version of the following applications on your PC:
- BizTalk Server 2002 SP1
- Commerce Server 2002 SP4, 2007 SP2, and 2009 Gold, and R2
- Microsoft Office 2003 SP3
- Microsoft Office 2003 Web Components SP3
- Microsoft Office 2007 SP2 and SP3
- Microsoft Office 2010 Gold and SP1
- SQL Server 2000 SP4, 2005 SP4, and 2008 SP2, SP3, and R2
- Visual Basic 6.0 Runtime
- Visual FoxPro 8.0 SP1 and 9.0 SP2
It is most often distributed through emails.
You may get an alert about this threat even if you're not using a vulnerable version of the application. This is because we detect when a website or file tries to use the vulnerability, even if it isn't successful.
Win32/CVE-2014-4114
Windows Defender detects and removes this threat.
This threat uses a Microsoft vulnerability to download and run files on your PC, including other malware. It is also called the "Sandworm" vulnerability or the "Windows OLE Remote Code Execution Vulnerability".
You can read more and apply updates to prevent exploiting this vulnerability in Microsoft Security Bulletin MS14-060.
It runs if you try to open an Office document and have one of the following vulnerable versions Windows:
- Windows 8.1
- Windows 8
- Windows 7 SP1
- Windows Vista SP2
- Windows RT 8.1
- Windows RT
- Windows Server 2012
- Windows Server 2012 R2
- Windows Server 2008 SP2
- Windows Server 2008 R2 SP1
You may get an alert about this threat even if you're not using a vulnerable version of the application. This is because we detect when a website or file tries to use the vulnerability, even if it isn't successful.