1. /
  2. Security Response/
  3. Trojan.Maljava


Risk Level 1: Very Low

October 19, 2010
September 27, 2013 11:49:32 AM
Trojan, Virus
Systems Affected:
Windows 2000, Windows 7, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows Server 2008, Windows Vista, Windows XP
CVE References:
CVE-2009-3910, CVE-2009-3864, CVE-2008-5359, CVE-2009-3877, CVE-2009-3865, CVE-2008-5360, CVE-2008-5357, CVE-2009-3879, CVE-2009-3885, CVE-2009-3886, CVE-2009-3880, CVE-2008-5358, CVE-2009-3873, CVE-2009-3874, CVE-2008-5348, CVE-2008-5346, CVE-2008-5349, CVE-2009-3872, CVE-2009-3883, CVE-2010-3910, CVE-2008-5353, CVE-2009-3882, CVE-2009-3868, CVE-2009-3869, CVE-2009-3875, CVE-2009-3867, CVE-2008-5347, CVE-2009-3884, CVE-2009-3881, CVE-2008-5355, CVE-2009-3866, CVE-2013-0422, CVE-2008-5350, CVE-2008-5354, CVE-2009-3729, CVE-2008-5352, CVE-2008-5356, CVE-2008-5351, CVE-2008-5345, CVE-2009-3871, CVE-2009-3728, CVE-2009-3876
Trojan.Maljava is a detection name used by Symantec to identify malicious Java files that exploit one or more vulnerabilities.

Antivirus Protection Dates

  • Initial Rapid Release version October 19, 2010 revision 053
  • Latest Rapid Release version November 8, 2013 revision 021
  • Initial Daily Certified version October 20, 2010 revision 002
  • Latest Daily Certified version November 9, 2013 revision 006
  • Initial Weekly Certified release date October 20, 2010
Click here for a more detailed description of Rapid Release and Daily Certified virus definitions.

Threat Assessment


  • Wild Level: Low
  • Number of Infections: 0 - 49
  • Number of Sites: 0 - 2
  • Geographical Distribution: Low
  • Threat Containment: Easy
  • Removal: Easy


  • Damage Level: Low


  • Distribution Level: Low
Note: On May 14, 2015, modifications will be made to the threat write-ups to streamline the content. The Threat Assessment section will no longer be published as this section is no longer relevant to today's threat landscape. The Risk Level will continue to be the main threat risk assessment indicator.

Search Threats

Search by name
Example: W32.Beagle.AG@mm
STAR Antimalware Protection Technologies
Internet Security Threat Report