HTTP: Neutrino Payload Exploit Kit

This signature detects scripts obfuscated (made unclear) with JavaScript. This is a technique commonly used by malicious Web sites to hide the malicious nature of the Web pages being downloaded by a user. A successful attack will lead to Sandbox Bypass.

Extended Description

Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via unknown vectors related to HotSpot. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from the original researcher that this vulnerability allows remote attackers to bypass permission checks by the MethodHandles method and modify arbitrary public final fields using reflection and type confusion, as demonstrated using integer and double fields to disable the security manager.

Affected Products

Oracle jre

References

CVE: CVE-2013-2465

Short Name
HTTP:NEUTRINO-EK-SB
Severity
Major
Recommended
True
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2013-2423 CVE-2013-2465 Exploit Kit Neutrino Payload
Release Date
06/12/2015
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3700
False Positive
Unknown
Vendors

Opensuse

Oracle

Canonical

CVSS Score

10.0

4.3

Found a potential security threat?