2 results (0.006 seconds)

CVSS: 6.3EPSS: 0%CPEs: 1EXPL: 0

XZ Utils provide a general-purpose data-compression library plus command-line tools. When built for native Windows (MinGW-w64 or MSVC), the command line tools from XZ Utils 5.6.2 and older have a command line argument injection vulnerability. If a command line contains Unicode characters (for example, filenames) that don't exist in the current legacy code page, the characters are converted to similar-looking characters with best-fit mapping. Some best-fit mappings result in ASCII characters that change the meaning of the command line, which can be exploited with malicious filenames to do argument injection or directory traversal attacks. This vulnerability is fixed in 5.6.3. • https://github.com/tukaani-project/xz/commit/bf518b9ba446327a062ddfe67e7e0a5baed2394f https://github.com/tukaani-project/xz/security/advisories/GHSA-m538-c5qw-3cg4 • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') CWE-176: Improper Handling of Unicode Encoding •

CVSS: 10.0EPSS: 16%CPEs: 2EXPL: 34

Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library. Se descubrió código malicioso en los archivos tar ascendentes de xz, a partir de la versión 5.6.0. A través de una serie de ofuscaciones complejas, el proceso de compilación de liblzma extrae un archivo objeto premanipulado de un archivo de prueba disfrazado existente en el código fuente, que luego se utiliza para modificar funciones específicas en el código de liblzma. • https://github.com/r0binak/xzk8s https://github.com/lypd0/CVE-2024-3094-Vulnerabity-Checker https://github.com/DANO-AMP/CVE-2024-3094 https://github.com/Security-Phoenix-demo/CVE-2024-3094-fix-exploits https://github.com/byinarie/CVE-2024-3094-info https://github.com/FabioBaroni/CVE-2024-3094-checker https://github.com/alokemajumder/CVE-2024-3094-Vulnerability-Checker-Fixer https://github.com/teyhouse/CVE-2024-3094 https://github.com/gustavorobertux/CVE-2024-3094 https://github. • CWE-506: Embedded Malicious Code •