Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Windows >> JS.Scob.Trojan or Download.Ject Trojan


Vulnerability Assessment Details

JS.Scob.Trojan or Download.Ject Trojan

Vulnerability Assessment Summary
JS.Scob.Trojan/JS/Exploit-DialogArg.b Trojan

Detailed Explanation for this Vulnerability Assessment

JS.Scob.Trojan or Download.Ject Trojan

JS.Scob.Trojan or Download.Ject is a simple Trojan that executes a
JavaScript file from a remote server.

The Trojan's dropper sets it as the document footer for all pages
served by IIS Web sites on the infected computer. The existence of
Kk32.dll or Surf.dat may indicate a client side infection. More
information is available here:

http://www.microsoft.com/security/incident/download_ject.mspx

Solution : Use Latest Anti Virus to clean machine. Virus Definitions
and removal tools are being released as of 06/25/04

Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Jeff Adams

Cables, Connectors

Samsung 840 EVO 1TB 2.5" SATA III SSD Solid State Drive MZ7TE1T0HMHP MZ-7TE1T0
$318.93
Samsung 840 EVO 1TB 2.5ADATA Ultimate SU800 256GB 3D NAND 2.5 Inch SATA-III Internal Solid State Drive
$70.99
ADATA Ultimate SU800 256GB 3D NAND 2.5 Inch SATA-III Internal Solid State Drive pictureSilicon Power S55 120GB 2.5" 7mm SATA III Internal Solid State Drive SP120GBSS3S
$9499.0
Silicon Power S55 120GB 2.5Samsung MZ-7TE2560 HP P/N 742038-002 256GB PM851 SSD 2.5" Solid State Drive
$41.99
Samsung MZ-7TE2560 HP P/N 742038-002 256GB PM851 SSD 2.5


Discussions

No Discussions have been posted on this vulnerability.