Update: the exploit (or this variant at least) is not detected by avast!
I’ve sent the exploit to virus[at]avast.com.
Antivirus Version Last Update Result
AhnLab-V3 2008.1.16.10 2008.01.15 -
AntiVir 7.6.0.46 2008.01.15 HTML/Silly.Gen
Authentium 4.93.8 2008.01.13 -
Avast 4.7.1098.0 2008.01.14 -
AVG 7.5.0.516 2008.01.14 Exploit
BitDefender 7.2 2008.01.15 Trojan.Downloader.JS.Agent.ON
CAT-QuickHeal 9.00 2008.01.15 -
ClamAV 0.91.2 2008.01.14 -
DrWeb 4.44.0.09170 2008.01.15 -
eSafe 7.0.15.0 2008.01.14 JS.IEslice.aq
eTrust-Vet 31.3.5459 2008.01.15 JS/SillyDlScript.DG
Ewido 4.0 2008.01.15 -
FileAdvisor 1 2008.01.15 -
Fortinet 3.14.0.0 2008.01.15 -
F-Prot 4.4.2.54 2008.01.14 -
F-Secure 6.70.13030.0 2008.01.15 Exploit.HTML.IESlice.bz
Ikarus T3.1.1.20 2008.01.15 Virus.Exploit.HTML.IESlice.bz
Kaspersky 7.0.0.125 2008.01.15 Exploit.HTML.IESlice.bz
McAfee 5207 2008.01.15 JS/Downloader-AUD
Microsoft 1.3109 2008.01.15 Exploit:JS/Mult.K
NOD32v2 2792 2008.01.15 -
Norman 5.80.02 2008.01.15 -
Panda 9.0.0.4 2008.01.14 -
Prevx1 V2 2008.01.15 -
Rising 20.27.12.00 2008.01.15 -
Sophos 4.24.0 2008.01.15 Mal/ExpJS-D
Sunbelt 2.2.907.0 2008.01.15 -
Symantec 10 2008.01.15 Trojan.Webkit!html
TheHacker 6.2.9.187 2008.01.13 -
VBA32 3.12.2.5 2008.01.13 -
VirusBuster 4.3.26:9 2008.01.15 -
Webwasher-Gateway 6.6.2 2008.01.15 Script.Silly.Gen
Seems to be the one mentioned here:
http://www.webhostingtalk.com/showthread.php?t=651748
More info. here:
http://blog.scansafe.com/journal/2008/1/15/mom-pop-sites-hit-hard-by-host-compromise.html