Search
Keyword: rtf stack buffer overflow vulnerability cve-2010-3333
35 Total Search |
Showing Results : 1 - 20
Stack-based buffer overflow in Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for M...
This Trojan drops and executes files detected by Trend Micro as BKDR_SKYIPOT.ZIt takes advantage of the following software vulnerabilities to drop malicious files: RTF Stack Buffer Overflow Vulnerability (CVE-2010-3333)This Trojan arrives as an atta...
Once a malware successfully exploits the said vulnerability, it causes certain actions to be done on the system.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It does not have any propagation routine.It does not have any backdoor routine.It does not have any downloading capability.It does not have a...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It cont...
Once a malware successfully exploits the said vulnerability, it causes certain actions to be done on the system.
Reports of highly targeted attacks have dramatically increased in number. Highly targeted attacks differ from traditional threats as these attacks are similar to “cyber espionage.” Attackers work h...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It cont...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.However, due to errors in its code, it fails to perform its intended routine.
This security update addresses vulnerabilities in Microsoft Office that could allow remote execution when an unsuspecting user opens a specially crafted .RTF e...
This Trojan takes advantage of the RTF Stack Buffer Overflow Vulnerability in order to drop malicious files into an affected system.Once it exploits the said vulnerability, it drops a file, which is detected as TROJ_DROPR.VTG. This Trojan executes th...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.However, due to errors in its code, it fails to perform its intended routine.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It does not have any downloading capability.It does not have any i...
This Trojan arrives as attachment to mass-mailed email messages.It contains errors in its code. This stops it from performing its routines.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites.It executes the dropped file(s). As a result, malicious routine...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes the files it drops, prompting the affected system to exhibit the malicious routines they contai...
This Trojan takes advantage of software vulnerabilities in certain software to drop malicious files.
This description is based on a compiled analysis of several variants of TROJ_ARTIEF. Note that specific data such as file names and registry values may vary for each variant.This Trojan arrives as an attachment to email messages spammed by other mal...
This malware is involved in socially-engineered attacks that feature a popular celebrity. It is also part of the LURID malware campaign.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.Thi...