Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2024-3094

Опубликовано: 29 мар. 2024
Источник: nvd
CVSS3: 10
EPSS Высокий

Описание

Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:tukaani:xz:5.6.0:*:*:*:*:*:*:*
cpe:2.3:a:tukaani:xz:5.6.1:*:*:*:*:*:*:*

EPSS

Процентиль: 99%
0.858
Высокий

10 Critical

CVSS3

Дефекты

CWE-506

Связанные уязвимости

CVSS3: 10
ubuntu
почти 2 года назад

Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.

CVSS3: 10
redhat
почти 2 года назад

Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.

CVSS3: 10
debian
почти 2 года назад

Malicious code was discovered in the upstream tarballs of xz, starting ...

CVSS3: 10
github
почти 2 года назад

Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. The tarballs included extra .m4 files, which contained instructions for building with automake that did not exist in the repository. These instructions, through a series of complex obfuscations, extract a prebuilt object file from one of the test archives, which is then used to modify specific functions in the code while building the liblzma package. This issue results in liblzma being used by additional software, like sshd, to provide functionality that will be interpreted by the modified functions.

CVSS3: 10
fstec
почти 2 года назад

Уязвимость библиотеки liblzma пакета для сжатия данных XZ Utils, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 99%
0.858
Высокий

10 Critical

CVSS3

Дефекты

CWE-506