Vulnerability Details : CVE-2024-3094
Potential exploit
Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0.
Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.
Products affected by CVE-2024-3094
- cpe:2.3:a:tukaani:xz:5.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:tukaani:xz:5.6.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2024-3094
84.69%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2024-3094
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
3.9
|
6.0
|
NIST | 2024-04-01 |
10.0
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
3.9
|
6.0
|
Red Hat, Inc. | 2024-03-29 |
10.0
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
N/A
|
N/A
|
RedHat-CVE-2024-3094 | 2024-03-29 |
CWE ids for CVE-2024-3094
-
The product contains code that appears to be malicious in nature.Assigned by: secalert@redhat.com (Secondary)
References for CVE-2024-3094
-
https://security.alpinelinux.org/vuln/CVE-2024-3094
CVE-2024-3094 — Alpine Security TrackerThird Party Advisory
-
https://lists.freebsd.org/archives/freebsd-security/2024-March/000248.html
Disclosed backdoor in xz releases - FreeBSD not affectedThird Party Advisory
-
https://bugs.gentoo.org/928134
928134 – (CVE-2024-3094) >=app-arch/xz-utils-5.6.0: backdoor in release tarballsIssue Tracking;Third Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=2272210
2272210 – (CVE-2024-3094) CVE-2024-3094 xz: malicious code in distributed sourceIssue Tracking;Vendor Advisory
-
https://lists.debian.org/debian-security-announce/2024/msg00057.html
[SECURITY] [DSA 5649-1] xz-utils security updateMailing List;Third Party Advisory
-
https://twitter.com/LetsDefendIO/status/1774804387417751958
LetsDefend on X: "XZ-utils backdoor (CVE-2024-3094) https://t.co/cRLaiDfeVm" / XThird Party Advisory
-
https://gynvael.coldwind.pl/?lang=en&id=782
xz/liblzma: Bash-stage Obfuscation Explained - gynvael.coldwind//vx.logTechnical Description;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2024/03/29/12
oss-security - Re: backdoor in upstream xz/liblzma leading to ssh server compromise
-
https://github.com/karcherm/xz-malware
GitHub - karcherm/xz-malware: Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1Third Party Advisory
-
https://news.ycombinator.com/item?id=39877267
XZ backdoor: "It's RCE, not auth bypass, and gated/unreplayable." | Hacker NewsIssue Tracking
-
https://security.archlinux.org/CVE-2024-3094
CVE-2024-3094 - xz - Arch LinuxThird Party Advisory
-
https://security-tracker.debian.org/tracker/CVE-2024-3094
CVE-2024-3094Third Party Advisory
-
https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094
Reported Supply Chain Compromise Affecting XZ Utils Data Compression Library, CVE-2024-3094 | CISAThird Party Advisory;US Government Resource
-
https://www.openwall.com/lists/oss-security/2024/03/29/4
oss-security - backdoor in upstream xz/liblzma leading to ssh server compromiseMailing List
-
https://twitter.com/debian/status/1774219194638409898
The Debian Project on X: "Although no Debian stable versions are known to be affected by CVE-2024-3094 the next point release for 12.6 has been postponed while we investigate the effects of this CVE oPress/Media Coverage
-
https://arstechnica.com/security/2024/03/backdoor-found-in-widely-used-linux-utility-breaks-encrypted-ssh-connections/
Backdoor found in widely used Linux utility breaks encrypted SSH connections | Ars TechnicaThird Party Advisory
-
https://github.com/amlweems/xzbot
GitHub - amlweems/xzbot: notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)
-
https://lwn.net/Articles/967180/
A backdoor in xz [LWN.net]Issue Tracking;Third Party Advisory
-
https://aws.amazon.com/security/security-bulletins/AWS-2024-002/
CVE-2024-3094Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2024/03/29/4
oss-security - backdoor in upstream xz/liblzma leading to ssh server compromise
-
https://www.vicarius.io/vsociety/vulnerabilities/cve-2024-3094
CVE-2024-3094 - vsociety
-
https://news.ycombinator.com/item?id=39895344
Xzbot: Notes, honeypot, and exploit demo for the xz backdoor | Hacker News
-
https://news.ycombinator.com/item?id=39865810
Backdoor in upstream xz/liblzma leading to SSH server compromise | Hacker NewsIssue Tracking;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2024/03/29/10
oss-security - Re: backdoor in upstream xz/liblzma leading to ssh server compromise
-
https://www.redhat.com/en/blog/urgent-security-alert-fedora-41-and-rawhide-users
Urgent security alert for Fedora 41 and Fedora Rawhide usersVendor Advisory
-
https://ariadne.space/2024/04/02/the-xz-utils-backdoor-is-a-symptom-of-a-larger-problem/
The XZ Utils backdoor is a symptom of a larger problem | Ariadne's Space
-
https://github.com/advisories/GHSA-rxwq-x6h5-x525
Malicious code was discovered in the upstream tarballs of... · CVE-2024-3094 · GitHub Advisory Database · GitHubThird Party Advisory
-
https://access.redhat.com/security/cve/CVE-2024-3094
CVE-2024-3094- Red Hat Customer PortalVendor Advisory
-
http://www.openwall.com/lists/oss-security/2024/03/29/5
oss-security - Re: backdoor in upstream xz/liblzma leading to ssh server compromise
-
https://openssf.org/blog/2024/03/30/xz-backdoor-cve-2024-3094/
xz Backdoor CVE-2024-3094 – Open Source Security FoundationThird Party Advisory
-
https://xeiaso.net/notes/2024/xz-vuln/
liblzma and xz version 5.6.0 and 5.6.1 are vulnerable to arbitrary code execution compromise - Xe IasoThird Party Advisory
-
https://www.theregister.com/2024/03/29/malicious_backdoor_xz/
Malicious backdoor spotted in Linux compression library xz • The RegisterPress/Media Coverage
-
https://security.netapp.com/advisory/ntap-20240402-0001/
CVE-2024-3094 XZ Utils Vulnerability in NetApp Products | NetApp Product Security
-
http://www.openwall.com/lists/oss-security/2024/03/30/12
oss-security - Re: backdoor in upstream xz/liblzma leading to ssh server compromise
-
https://bugzilla.suse.com/show_bug.cgi?id=1222124
1222124 – (CVE-2024-3094) VUL-0: CVE-2024-3094: xz: backdoored 5.6.0,5.6.1 versionIssue Tracking;Third Party Advisory
-
https://research.swtch.com/xz-timeline
research!rsc: Timeline of the xz open source attack
-
http://www.openwall.com/lists/oss-security/2024/03/30/36
oss-security - Re: backdoor in upstream xz/liblzma leading to ssh server compromise
-
https://research.swtch.com/xz-script
research!rsc: The xz attack shell script
-
https://tukaani.org/xz-backdoor/
XZ Utils backdoorIssue Tracking;Vendor Advisory
-
https://boehs.org/node/everything-i-know-about-the-xz-backdoor
Everything I know about the XZ backdoorThird Party Advisory
-
https://www.kali.org/blog/about-the-xz-backdoor/
All about the xz-utils backdoor | Kali Linux Blog
-
https://twitter.com/infosecb/status/1774597228864139400
Brendan Chamberlain on X: "xz was upgraded to 5.6.0 on Feb 29th: https://t.co/ifEVTQhmT3 and was reverted to 5.4.6 two days ago on 3/29: https://t.co/CEbVePLNU8" / XPress/Media Coverage
-
https://discourse.nixos.org/t/cve-2024-3094-malicious-code-in-xz-5-6-0-and-5-6-1-tarballs/42405
CVE-2024-3094: Malicious code in xz 5.6.0 and 5.6.1 tarballs - Development / Security - NixOS DiscourseThird Party Advisory
-
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068024
#1068024 - revert to version that does not contain changes by bad actor - Debian Bug report logsMailing List;Vendor Advisory
-
https://twitter.com/infosecb/status/1774595540233167206
Brendan Chamberlain on X: "macOS homebrew users: if you installed any version of Python v3 on macOS using homebrew, there's a chance xz v5.6.1 was installed as a dependency. Check by running xz --versPress/Media Coverage
-
https://www.darkreading.com/vulnerabilities-threats/are-you-affected-by-the-backdoor-in-xz-utils
Are You Affected by the Backdoor in XZ Utils?Third Party Advisory
-
https://blog.netbsd.org/tnf/entry/statement_on_backdoor_in_xz
NetBSD Blog
-
https://gist.github.com/thesamesam/223949d5a074ebc3dce9ee78baad9e27
xz-utils backdoor situation · GitHubThird Party Advisory
-
https://ubuntu.com/security/CVE-2024-3094
CVE-2024-3094 | UbuntuThird Party Advisory
-
http://www.openwall.com/lists/oss-security/2024/03/30/27
oss-security - Re: backdoor in upstream xz/liblzma leading to ssh server compromise
-
http://www.openwall.com/lists/oss-security/2024/03/30/5
oss-security - Re: backdoor in upstream xz/liblzma leading to ssh server compromise
-
http://www.openwall.com/lists/oss-security/2024/03/29/8
oss-security - Re: backdoor in upstream xz/liblzma leading to ssh server compromise
-
https://www.tenable.com/blog/frequently-asked-questions-cve-2024-3094-supply-chain-backdoor-in-xz-utils
Frequently Asked Questions About CVE-2024-3094, A Backdoor in XZ Utils - Blog | Tenable®Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2024/04/16/5
oss-security - Re: backdoor in upstream xz/liblzma leading to ssh server compromise
Jump to