1. /
  2. Security Response/
  3. Bloodhound.Exploit.6

Bloodhound.Exploit.6

Risk Level 1: Very Low

Discovered:
February 13, 2004
Updated:
February 13, 2007 12:19:00 PM
Type:
Trojan Horse
Systems Affected:
Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows XP

Bloodhound.Exploit.6 is a heuristic detection for exploits of a Microsoft Internet Explorer vulnerability. This vulnerability was discovered in February 2004.

The vulnerability results from the incorrect handling of HTML files embedded in CHM files. (CHM is the Microsoft-compiled HTML help format.)

For more information, and to download a patch for the vulnerability, read Microsoft Security Bulletin MS04-013.




The following information is provided for your convenience and is for Internet Explorer 6.0. If you need help with this procedure or have any question, please contact Microsoft Technical Support.

To clear the Temporary Internet Files folder and delete cookies

NOTE: Some Web sites use cookies to allow you to log in to them. Before you delete cookies, make sure that you have a record of all such login names and passwords.
  1. Start Internet Explorer.
  2. Click Tools > Internet Options.
  3. In the Temporary Internet Files section, click the Delete Files button.
  4. Check Delete all offline content and then click OK.
  5. Click Delete Cookies and then click OK.


Antivirus Protection Dates

  • Initial Rapid Release version February 13, 2004
  • Latest Rapid Release version September 28, 2010 revision 054
  • Initial Daily Certified version February 13, 2004
  • Latest Daily Certified version September 28, 2010 revision 036
  • Initial Weekly Certified release date February 13, 2004
Click here for a more detailed description of Rapid Release and Daily Certified virus definitions.

Threat Assessment

Wild

  • Wild Level: Low
  • Number of Infections: 0 - 49
  • Number of Sites: 0 - 2
  • Geographical Distribution: Low
  • Threat Containment: Easy
  • Removal: Easy

Damage

  • Damage Level: Low

Distribution

  • Distribution Level: Low
Writeup By: Frederic Perriot

Search Threats

Search by name
Example: W32.Beagle.AG@mm
STAR Antimalware Protection Technologies
Internet Security Threat Report
Symantec DeepSight Screensaver