CVE-2024-3094
Xz: malicious code in distributed source
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
34Exploited in Wild
-Decision
Descriptions
Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0.
Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.
Se descubrió código malicioso en los archivos tar ascendentes de xz, a partir de la versión 5.6.0. A través de una serie de ofuscaciones complejas, el proceso de compilación de liblzma extrae un archivo objeto premanipulado de un archivo de prueba disfrazado existente en el código fuente, que luego se utiliza para modificar funciones específicas en el código de liblzma. Esto da como resultado una librería liblzma modificada que puede ser utilizada por cualquier software vinculado a esta librería, interceptando y modificando la interacción de datos con esta librería.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2024-03-29 CVE Reserved
- 2024-03-29 CVE Published
- 2024-03-29 First Exploit
- 2024-08-20 CVE Updated
- 2024-10-04 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-506: Embedded Malicious Code
CAPEC
References (88)
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/security/cve/CVE-2024-3094 | 2024-05-01 | |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068024 | 2024-05-01 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2272210 | 2024-05-01 | |
https://tukaani.org/xz-backdoor | 2024-05-01 | |
https://www.redhat.com/en/blog/urgent-security-alert-fedora-41-and-rawhide-users | 2024-05-01 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Tukaani Search vendor "Tukaani" | XZ Search vendor "Tukaani" for product "XZ" | 5.6.0 Search vendor "Tukaani" for product "XZ" and version "5.6.0" | - |
Affected
| ||||||
Tukaani Search vendor "Tukaani" | XZ Search vendor "Tukaani" for product "XZ" | 5.6.1 Search vendor "Tukaani" for product "XZ" and version "5.6.1" | - |
Affected
|