Home / malware Exploit:JS/CVE-2013-2551
First posted on 25 February 2019.
Source: MicrosoftAliases :
There are no other names known for Exploit:JS/CVE-2013-2551.
Explanation :
Threat in context
Exploit:JS/CVE-2013-2551 is a detection of an exploit which uses CVE-2013-2551 vulnerability to run the code on a remote machine. This malware exploits Internet Explorer's COALineDashStyleArray class in SVG VML component the using use-after-free condition. It is normally served in a browser context.
What is an exploit?
Exploits are written to take advantage of weaknesses (or vulnerabilities) in legitimate software. A project called Common Vulnerabilities and Exposures (CVE) gives each vulnerability a unique number, in this case "CVE-2013-2551".
You can find more information on the CVE website or on our page about exploits.
Payload
Downloads malware
This threat downloads and runs potentially malicious programs.
We have seen it download variants from several malware families, including Win32/Simda, Win32/Urausy, Win32/Karagany, Win32/Reveton, Win32/Sirefef.
This exploit is distributed among the following Exploit Kits: Fiesta, Angler, Magnitude, Nuclear, and others.
Analysis by Justin KimLast update 25 February 2019