Home / malwarePDF  

Exploit:JS/CVE-2013-2551


First posted on 25 February 2019.
Source: Microsoft

Aliases :

There are no other names known for Exploit:JS/CVE-2013-2551.

Explanation :

Threat in context

Exploit:JS/CVE-2013-2551 is a detection of an exploit which uses CVE-2013-2551 vulnerability to run the code on a remote machine. This malware exploits Internet Explorer's COALineDashStyleArray class in SVG VML component  the using use-after-free condition. It is normally served in a browser context.

What is an exploit?

Exploits are written to take advantage of weaknesses (or vulnerabilities) in legitimate software. A project called Common Vulnerabilities and Exposures (CVE) gives each vulnerability a unique number, in this case "CVE-2013-2551". 

You can find more information on the CVE website or on our page about exploits.

Payload

Downloads malware

This threat downloads and runs potentially malicious programs.

We have seen it download variants from several malware families, including Win32/Simda, Win32/Urausy, Win32/Karagany, Win32/Reveton, Win32/Sirefef.

This exploit is distributed among the following Exploit Kits: Fiesta, Angler, Magnitude, Nuclear, and others.

Analysis by Justin Kim

Last update 25 February 2019

 

TOP