The exploit was released by security research group Packet Storm Security.
Styx exploit kit, previously known as Kein
Fiesta EK
Vulnerability details
Advisory: SB2013061801 - Remote code execution in Oracle Java SE
Vulnerable component: Oracle Java SE
CVE-ID: CVE-2013-2465
CVSSv3 score: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:H/RL:O/RC:C
CWE-ID: CWE-129 - Improper Validation of Array Index
Description:
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to an array indexing error in the storeImageArray() function in awt.dll. A remote attacker can execute arbitrary code with privileges of the current user or targeted application process.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
Note: the vulnerability was being actively exploited.
Public Exploits:
- Java - storeImageArray() Invalid Array Indexing (Metasploit) [Exploit-DB]
External links:
http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html
https://www.symantec.com/security_response/attacksignatures/detail.jsp?asid=26978
https://www.zscaler.com/blogs/research/exploring-java-vulnerability-cve-2013-2465-used-fiesta-ek
http://infosecdailydigest.com/2013/08/24/metasploit-module-demo-for-cve-2013-2465-java-storeimagearr...
https://sgros-students.blogspot.com/2014/01/java-cve-2013-2465-vulnerability-and.html
http://www.pcworld.com/article/2046821/cybercriminals-add-new-exploit-for-recently-patched-java-vuln...