FireEye Uncovers 7 Zero Day Flaws That Hackers Use To Carry Advanced Attacks


FireEye Inc., announced that the company has discovered seven zero-day vulnerabilities during the first half of 2013. Each of the vulnerabilities uncovered was exploited by advanced attacks across a number of applications, including Microsoft Internet Explorer, Adobe Flash, PDFs, Oracle, and Java, and highlight a growing trend of organizations seeing damage to their reputations and critical infrastructure due to highly publicized zero-day threats.

FireEye Uncovers 7 Zero Day Flaws That Are Used For Advanced Attacks


"The consistent discovery of flaws by FireEye demonstrates the power of our virtual-machine technology and the caliber of our research group," said Zheng Bu, Senior Director of Research. "Our Multi-Vector Virtual ExecutionTM (MVX) engine offers a new and more sophisticated approach toward threat protection that can verify the existence and root cause of exploits before they are able to cause catastrophic damage."

Zero-day flaws are especially dangerous because of their ability to evade detection from traditional and next-generation firewalls, intrusion prevention systems, anti-virus, and Web gateways, leaving gaping holes in network defenses. As a result, the potential for loss and theft of customer information, intellectual property, and confidential information increases.

"The newest generation of cybercriminals are persistent, exploiting zero-day vulnerabilities that often leave security experts unaware of the holes in their networks until the damage has already been done," said Ashar Aziz, FireEye Founder and CTO. "To fill in the gap in network defenses, the FireEye technology is able to monitor both inbound and outbound attacks, identifying and blocking the activities of today's most advanced cyber attacks."

The seven zero-day flaws discovered by FireEye this year are:

CVE-2012-4792, Internet Explorer: Allowed remote attackers to execute arbitrary code via a crafted website that triggers access to an object that was not properly allocated or was deleted.

CVE-2013-0422, Java: Retrieved a template from the Web and created a full screen window demanding payment using some kind of social engineering scheme to scare the victim.


CVE-2013-0634, Flash: Allowed remote attackers to execute arbitrary code or caused a denial of service (memory corruption) via crafted SWF content.

CVE-2013-0640, CVE-2013-0641, PDF: Designed to trick Windows users into clicking on a malicious PDF file delivered in an email message.

CVE-2013-1493, Java: Allowed successful unauthenticated network attacks via multiple protocols, which resulted in unauthorized operating system takeover including arbitrary code execution.

CVE-2013-1347, Internet Explorer: Allowed remote attackers to execute arbitrary code via a crafted website that triggered access to an object that was not properly allocated or was deleted.

Most Read Articles
Best Mobiles in India

Read More About: fireeye hackers news

Best Phones

Get Instant News Updates
Notification Settings X
Time Settings
Clear Notification X
Do you want to clear all the notifications from your inbox?
Yes No
Settings X
We use cookies to ensure that we give you the best experience on our website. This includes cookies from third party social media websites and ad networks. Such third party cookies may track your use on Gizbot sites for better rendering. Our partners use cookies to ensure we show you advertising that is relevant to you. If you continue without changing your settings, we'll assume that you are happy to receive all cookies on Gizbot website. However, you can change your cookie settings at any time. Learn more