Bloodhound.Exploit.39

Printer Friendly Page

Discovered: June 15, 2005
Updated: February 13, 2007 12:40:35 PM
Systems Affected: Windows



Bloodhound.Exploit.39 is a heuristic detection for the HTML Help File Parsing Buffer Overflow (described in Microsoft Security Bulletin MS05-026 ).

Antivirus Protection Dates

  • Initial Rapid Release version June 15, 2005
  • Latest Rapid Release version June 15, 2005
  • Initial Daily Certified version October 31, 2007 revision 003
  • Latest Daily Certified version June 17, 2008 revision 017
  • Initial Weekly Certified release date June 15, 2005

Click here for a more detailed description of Rapid Release and Daily Certified virus definitions.

Discovered: June 15, 2005
Updated: February 13, 2007 12:40:35 PM
Systems Affected: Windows


Bloodhound.Exploit.39 is a heuristic detection for the HTML Help File Parsing Buffer Overflow. An attacker who exploits this vulnerability could perform a denial of service, or potentially execute arbitrary code with the privileges of the logged-on user. The exploit is triggered by opening the file, or viewing a web page that contains the file.

Affects: Microsoft Windows 2000/XP (including SP2)/2003

Files that are detected as Bloodhound.Exploit.39 may be malicious. We suggest that you submit to Symantec Security Response any files that are detected as Bloodhound.Exploit.39. For instructions on how to do this using Scan and Deliver, read How to submit a file to Symantec Security Response using Scan and Deliver .