Skip to content

Commit c5c2aeb

Browse files
author
jvazquez-r7
committed
Update references
1 parent cc5804f commit c5c2aeb

File tree

1 file changed

+6
-3
lines changed

1 file changed

+6
-3
lines changed

modules/exploits/multi/browser/java_storeimagearray.rb

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ def initialize( info = {} )
2121
'Name' => 'Java storeImageArray() Invalid Array Indexing Vulnerability',
2222
'Description' => %q{
2323
This module abuses an Invalid Array Indexing Vulnerability on the
24-
IntegerInterleavedRaster.verify() function in order to produce a
24+
static function storeImageArray() function in order to produce a
2525
memory corruption and finally escape the Java Sandbox. The vulnerability
2626
affects Java version 7u21 and earlier. The module, which doesn't bypass
2727
click2play, has been tested successfully on Java 7u21 on Windows and
@@ -36,8 +36,11 @@ def initialize( info = {} )
3636
],
3737
'References' =>
3838
[
39-
[ 'OSVDB', '96277' ],
40-
[ 'EDB', '27526' ]
39+
[ 'CVE', '2013-2465' ],
40+
[ 'OSVDB', '96269' ],
41+
[ 'EDB', '27526' ],
42+
[ 'URL', 'http://packetstormsecurity.com/files/122777/' ],
43+
[ 'URL', 'http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/2a9c79db0040' ]
4144
],
4245
'Platform' => [ 'java', 'win', 'linux' ],
4346
'Payload' => { 'Space' => 20480, 'BadChars' => '', 'DisableNops' => true },

0 commit comments

Comments
 (0)