JS/PropChange.A!exploit is the detection for malicious JavaScript files that exploit CVE-2013-3897, which is also known as the "Internet Explorer Memory Corruption Vulnerability". This is a vulnerability in the CDisplayPointer class in mshtml.dll of Microsoft Internet Explorer versions 6 through 11. The exploitation is performed by JavaScript code that uses the onpropertychange event handler. Successful exploitation may result in arbitrary code execution by a remote attacker or a denial of service.

Recommended Action

    FortiGate Systems
  • Check the main screen using the web interface for your FortiGate unit to ensure that the latest AV/NIDS database has been downloaded and installed on your system - if required, enable the "Allow Push Update" option.
    FortiClient Systems
  • Quarantine/delete files that are detected and replace infected files with clean backup copies.
  • Download and install the following patch released by Microsoft: Microsoft Security Bulletin MS13-080 - Critical .