Malicious Code Discovered in xz Upstream Tarballs, Affecting liblzma and Other Dependent Packages

CVE-2024-3094

10CRITICAL

Key Information

Vendor
Red Hat
Status
Xz
Red Hat Enterprise Linux 6
Red Hat Enterprise Linux 7
Red Hat Enterprise Linux 8
Vendor
CVE Published:
29 March 2024

Badges

🔥 No. 1 Trending😄 Trended👾 Exploit Exists🔴 Public PoC🟡 EPSS 63%📰 News Worthy

What is CVE-2024-3094?

CVE-2024-3094 is a critical vulnerability affecting the xz utility, specifically through its upstream tarballs starting from version 5.6.0. xz is widely used for data compression in various systems and applications, including software packages and libraries. This vulnerability introduces malicious code that can manipulate the liblzma library, crucial for handling data compression tasks. Organizations utilizing software that links against liblzma may find their data integrity compromised, as the vulnerability allows for data interception and unauthorized modifications, severely threatening the confidentiality and accuracy of critical data operations.

Technical Details

The vulnerability originates from a sophisticated supply chain attack where obfuscated malicious code was embedded within the upstream tarballs of xz. Upon building the liblzma library, the build process extracts a disguised and prebuilt object file from a specially crafted test file present in the source code. This compromised object file alters essential functions within the liblzma library, enabling attackers to intercept and manipulate the data being processed by any software that depends on this library. The stealthy nature of the obfuscation makes detection challenging, allowing the backdoor to remain concealed.

Impact of the Vulnerability

  1. Data Integrity Breach: The manipulation of the liblzma library can lead to unauthorized alteration of compressed data, posing a significant risk to the integrity of crucial information handled by affected systems.

  2. Widespread Consequences for Dependent Software: Since liblzma is a common dependency in numerous applications and libraries, the impact of this vulnerability can cascade, potentially affecting a wide range of software ecosystems.

  3. Increased Attack Surface: By enabling data interception capabilities, this vulnerability may allow attackers to exploit further weaknesses, potentially leading to additional security breaches or the injection of additional malicious payloads into other processes or systems.

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

Leveraging Wazuh for Zero Trust security

Learn how Zero Trust security protects organizations by eliminating implicit trust, enabling continuous monitoring, and enhancing incident response

2 months ago

Online xz utility backdoor scanning tool issued

Binarly has issued a free online tool that would facilitate scanning a newly discovered backdoor and maximum severity vulnerability in xz tools and libraries used by major Linux distributions, tracked as CVE-2024-3094, across Linux binaries amid significant security risks, according to Security Affa...

5 months ago

Cve – InfoSec Write-ups

Read writing about Cve in InfoSec Write-ups. A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly...

5 months ago

Refferences

https://access.redhat.com/security/cve/CVE-2024-3094
vdb-entryx_refsource_REDHAT
https://bugzilla.redhat.com/show_bug.cgi?id=2272210
issue-trackingx_refsource_REDHAT
https://www.openwall.com/lists/oss-security/2024/03/29/4
https://www.redhat.com/en/blog/urgent-security-alert-fedo...
https://news.ycombinator.com/item?id=39865810
https://arstechnica.com/security/2024/03/backdoor-found-i...
https://www.theregister.com/2024/03/29/malicious_backdoor...
https://www.cisa.gov/news-events/alerts/2024/03/29/report...
https://www.darkreading.com/vulnerabilities-threats/are-y...
https://aws.amazon.com/security/security-bulletins/AWS-20...
https://www.tenable.com/blog/frequently-asked-questions-c...
https://openssf.org/blog/2024/03/30/xz-backdoor-cve-2024-...
https://bugzilla.suse.com/show_bug.cgi?id=1222124
https://security.archlinux.org/CVE-2024-3094
https://security.alpinelinux.org/vuln/CVE-2024-3094
https://security-tracker.debian.org/tracker/CVE-2024-3094
https://lists.freebsd.org/archives/freebsd-security/2024-...
https://news.ycombinator.com/item?id=39877267
https://gynvael.coldwind.pl/?lang=en&id=782
https://ubuntu.com/security/CVE-2024-3094
https://github.com/advisories/GHSA-rxwq-x6h5-x525
https://bugs.gentoo.org/928134
https://lists.debian.org/debian-security-announce/2024/ms...
https://twitter.com/debian/status/1774219194638409898
https://twitter.com/infosecb/status/1774597228864139400
https://twitter.com/infosecb/status/1774595540233167206
https://gist.github.com/thesamesam/223949d5a074ebc3dce9ee...
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068024
https://github.com/karcherm/xz-malware
https://discourse.nixos.org/t/cve-2024-3094-malicious-cod...
https://xeiaso.net/notes/2024/xz-vuln/
https://lwn.net/Articles/967180/
https://boehs.org/node/everything-i-know-about-the-xz-bac...
https://tukaani.org/xz-backdoor/
https://twitter.com/LetsDefendIO/status/1774804387417751958
https://www.vicarius.io/vsociety/vulnerabilities/cve-2024...
https://news.ycombinator.com/item?id=39895344
https://github.com/amlweems/xzbot
https://security.netapp.com/advisory/ntap-20240402-0001/
https://www.kali.org/blog/about-the-xz-backdoor/
https://ariadne.space/2024/04/02/the-xz-utils-backdoor-is...
https://research.swtch.com/xz-timeline
https://research.swtch.com/xz-script
https://blog.netbsd.org/tnf/entry/statement_on_backdoor_i...

EPSS Score

63% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
10
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • 🔴

    Public PoC available

  • 👾

    Exploit known to exist

  • 🔥

    Vulnerability reached the number 1 worldwide trending spot

  • Vulnerability started trending

  • Vulnerability Reserved

  • First article discovered by Beeping Computers

  • Vulnerability published

Collectors

NVD DatabaseMitre Database4 Proof of Concept(s)21 News Article(s)

Credit

Red Hat would like to thank Andres Freund for reporting this issue.
.