5 results (0.010 seconds)

CVSS: 6.3EPSS: 0%CPEs: 1EXPL: 0

XZ Utils provide a general-purpose data-compression library plus command-line tools. When built for native Windows (MinGW-w64 or MSVC), the command line tools from XZ Utils 5.6.2 and older have a command line argument injection vulnerability. If a command line contains Unicode characters (for example, filenames) that don't exist in the current legacy code page, the characters are converted to similar-looking characters with best-fit mapping. Some best-fit mappings result in ASCII characters that change the meaning of the command line, which can be exploited with malicious filenames to do argument injection or directory traversal attacks. This vulnerability is fixed in 5.6.3. • https://github.com/tukaani-project/xz/commit/bf518b9ba446327a062ddfe67e7e0a5baed2394f https://github.com/tukaani-project/xz/security/advisories/GHSA-m538-c5qw-3cg4 • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') CWE-176: Improper Handling of Unicode Encoding •

CVSS: 10.0EPSS: 16%CPEs: 2EXPL: 34

Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library. Se descubrió código malicioso en los archivos tar ascendentes de xz, a partir de la versión 5.6.0. A través de una serie de ofuscaciones complejas, el proceso de compilación de liblzma extrae un archivo objeto premanipulado de un archivo de prueba disfrazado existente en el código fuente, que luego se utiliza para modificar funciones específicas en el código de liblzma. • https://github.com/r0binak/xzk8s https://github.com/lypd0/CVE-2024-3094-Vulnerabity-Checker https://github.com/DANO-AMP/CVE-2024-3094 https://github.com/Security-Phoenix-demo/CVE-2024-3094-fix-exploits https://github.com/byinarie/CVE-2024-3094-info https://github.com/FabioBaroni/CVE-2024-3094-checker https://github.com/alokemajumder/CVE-2024-3094-Vulnerability-Checker-Fixer https://github.com/teyhouse/CVE-2024-3094 https://github.com/gustavorobertux/CVE-2024-3094 https://github. • CWE-506: Embedded Malicious Code •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

An issue discovered in XZ 5.2.5 allows attackers to cause a denial of service via decompression of a crafted file. NOTE: the vendor disputes the claims of "endless output" and "denial of service" because decompression of the 17,486 bytes always results in 114,881,179 bytes, which is often a reasonable size increase. ** DISPUTA ** Un problema descubierto en XZ 5.2.5 permite a los atacantes provocar una denegación de servicio mediante la descompresión de un archivo manipulado. NOTA: el proveedor cuestiona las afirmaciones de "endless output" y "denial of service" porque la descompresión de los 17.486 bytes siempre da como resultado 114.881.179 bytes, lo que suele ser un aumento de tamaño razonable. • http://web.archive.org/web/20230918084612/https://github.com/snappyJack/CVE-request-XZ-5.2.5-has-denial-of-service-vulnerability https://bugzilla.redhat.com/show_bug.cgi?id=2234987 https://bugzilla.suse.com/show_bug.cgi?id=1214590 https://github.com/snappyJack/CVE-request-XZ-5.2.5-has-denial-of-service-vulnerability https://github.com/tukaani-project/xz/issues/61 https://security-tracker.debian.org/tracker/CVE-2020-22916 https://tukaani.org/xz •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

xz is a compression and decompression library focusing on the xz format completely written in Go. The function readUvarint used to read the xz container format may not terminate a loop provide malicous input. The problem has been fixed in release v0.5.8. As a workaround users can limit the size of the compressed file input to a reasonable size for their use case. The standard library had recently the same issue and got the CVE-2020-16845 allocated. xz es una biblioteca de compresión y descompresión que se centra en el formato xz escrito completamente en Go. • https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b https://github.com/ulikunitz/xz/security/advisories/GHSA-25xm-hr59-7c27 https://access.redhat.com/security/cve/CVE-2021-29482 https://bugzilla.redhat.com/show_bug.cgi?id=1954368 • CWE-400: Uncontrolled Resource Consumption CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

scripts/xzgrep.in in xzgrep 5.2.x before 5.2.0, before 5.0.0 does not properly process file names containing semicolons, which allows remote attackers to execute arbitrary code by having a user run xzgrep on a crafted file name. El archivo scripts/xzgrep.in en xzgrep en versión 5.2.x anterior a la 5.0.0, hay una vulnerabilidad que no procesa de manera apropiada los nombres de los archivos que contienen punto y coma, lo que permite a los atacantes remotos ejecutar código arbitrario haciendo que un usuario ejecute xzgrep en un nombre de archivo creado. • http://seclists.org/oss-sec/2015/q2/484 http://www.openwall.com/lists/oss-security/2015/05/19/13 https://bugzilla.redhat.com/show_bug.cgi?id=1223341 https://git.tukaani.org/?p=xz.git%3Ba=commitdiff%3Bh=f4b2b52624b802c786e4e2a8eb6895794dd93b24 • CWE-20: Improper Input Validation •