Java/ByteVerify is actually a method to exploit a security vulnerability in the Microsoft Virtual Machine that is stored in the java cache as a java-applet. The vulnerability arises as the ByteCode verifier in the Microsoft VM does not correctly check for the presence of certain malformed code when a java-applet is loaded. Attackers can exploit the vulnerability by creating malicious Java applets and inserting them into web pages that could be hosted on a web site or sent to users as an attachment.
AVG will find Java/ByteVerify but cannot get rid of them. If you have the Java-Plugin installed, then deleting them from the Java cache will eliminate the problem. Clear the Java Runtime Environment (JRE) cache
. To do this:
- Click Start > Control Panel.
- Double-click the Java icon in the control panel.
-The Java Control Panel appears.
- Click "Settings" under Temporary Internet Files.
-The Temporary Files Settings dialog box appears.
- Click "Delete Files".
-The Delete Temporary Files dialog box appears.
-There are three options on this window to clear the cache.
- Delete Files
- View Applications
- View Applets
- Click "OK" on Delete Temporary Files window.
-Note: This deletes all the Downloaded Applications and Applets from the cache.
- Click "OK" on Temporary Files Settings window.
- Close the Java Control Panel.
You can also view these instructions along with graphics here
.VERIFY your JAVA Software Installation & Version here.
For other trojans download and scan with Ewido Anti-Malware v3.5Ewido Install and Scan Instructions
Edited by quietman7, 11 May 2006 - 10:40 AM.