Zero-day vulnerability in Java SE

Array indexing error
CVE-2013-2465

The exploit was released by security research group Packet Storm Security.

Known malware:

Styx exploit kit, previously known as Kein
Fiesta EK

Vulnerability details

Advisory: SB2013061801 - Remote code execution in Oracle Java SE

Vulnerable component: Java SE

CVE-ID: CVE-2013-2465

CVSSv3 score: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C

CWE-ID: CWE-129 - Improper Validation of Array Index

Description:

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to an array indexing error in the storeImageArray() function in awt.dll. A remote attacker can execute arbitrary code with privileges of the current user or targeted application process.

Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.

Note: the vulnerability was being actively exploited.

Public Exploits:

Vulnerability Scanning SaaS

Vulnerability scanning SaaS service is online 3-rd generation vulnerability scanner with scheduled assessments and vulnerability subscription. You can use service to check security of your network perimeter.