NA

CVE-2024-3094

Published: 29/03/2024 Updated: 12/04/2024
CVSS v3 Base Score: 10 | Impact Score: 6 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

Malicious code exists in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

tukaani xz 5.6.1

tukaani xz 5.6.0

Vendor Advisories

Malicious code was discovered in the upstream tarballs of xz, starting with version 560 The tarballs included extra m4 files, which contained instructions for building with automake that did not exist in the repository These instructions, through a series of complex obfuscations, extract a prebuilt object file from one of the test archives, wh ...
Check Point Reference: CPAI-2024-0162 Date Published: 2 Apr 2024 Severity: Critical ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Re: backdoor in upstream xz/liblzma leading to ssh server compromise <!--X-Subject-Header-End--> <!--X-Head-of-Message--> Fr ...
<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Re: backdoor in upstream xz/liblzma leading to ssh server compromise <!--X-Subject-Header-End--> <!--X-Head-of-Message--> Fr ...
<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Re: backdoor in upstream xz/liblzma leading to ssh server compromise <!--X-Subject-Header-End--> <!--X-Head-of-Message--> Fr ...
<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Re: backdoor in upstream xz/liblzma leading to ssh server compromise <!--X-Subject-Header-End--> <!--X-Head-of-Message--> Fr ...
<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Re: backdoor in upstream xz/liblzma leading to ssh server compromise <!--X-Subject-Header-End--> <!--X-Head-of-Message--> Fr ...
<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Re: backdoor in upstream xz/liblzma leading to ssh server compromise <!--X-Subject-Header-End--> <!--X-Head-of-Message--> Fr ...
<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> backdoor in upstream xz/liblzma leading to ssh server compromise <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: ...
<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Re: backdoor in upstream xz/liblzma leading to ssh server compromise <!--X-Subject-Header-End--> <!--X-Head-of-Message--> Fr ...
<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Re: backdoor in upstream xz/liblzma leading to ssh server compromise <!--X-Subject-Header-End--> <!--X-Head-of-Message--> Fr ...
<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Re: backdoor in upstream xz/liblzma leading to ssh server compromise <!--X-Subject-Header-End--> <!--X-Head-of-Message--> Fr ...

Github Repositories

Verify if your installed version of xz-utils is vulnerable to CVE-2024-3094 backdoor

xz-backdoor-CVE-2024-3094-Check Verify if your installed version of xz-utils is vulnerable to CVE-2024-3094 backdoor chmod +x check_xz_utils_CVE-2024-3094sh /check_xz_utils_CVE-2024-3094sh

A script to update xz when installed with brew

brew-xz-patcher A bash script to update xz when installed with brew Pragmatic countermeasure against CVE-2024-3094 By updating (actually it is rather downgrading) xz, the backdoor is reportedly gone Run with your MDM or as a standalone script This script will probably run just fine with your MDM solution as long as it is capable of running bash scripts (tested with Jamf Pro)

An xz-backdoor container image based on xzbot project for learning purpose

xz backdoor container image A container image of xz backdoor (CVE-2024-3094) based on an amazing work from @amlweems's xzbot project that can be run on both x86_64 and Apple Silicon (via QEMU or rosetta) THIS IS FOR LEARNING PURPOSE ONLY! Demo

CVE-2024-3094-detect XZ Utils Vulnerability Check and Downgrade Script This script is designed to check the version of XZ Utils installed on your Linux system and downgrade it to a safe version if necessary It also detects the Linux distribution and the package manager used Features Checks the installed version of XZ Utils and identifies if it's vulnerable Detects the

Bash script and 1-liner to validate if a system is running a vulnerable version of "xz" as per CVE-2024-3094

CVE-2024-3094_xz_check Bash script and 1-liner to validate if a system is running a vulnerable version of "xz" as per CVE-2024-3094 command -v xz &amp;&gt;/dev/null &amp;&amp; xz_version=$(xz --version | head -n 1 | awk '{print $4}') &amp;&amp; { [[ $xz_version == "560" || $xz_version == "561" ]] &amp;&

CVE-2024-3094-check curl -fsSL rawgithubusercontentcom/wgetnz/CVE-2024-3094-check/main/CVE-2024-3094-checksh| bash curl -fsSL githubfreednsuk/rawgithubusercontentcom/wgetnz/CVE-2024-3094-check/main/CVE-2024-3094-checksh| bash

K8S and Docker Vulnerability Check for CVE-2024-3094

CVE-2024-3094 Malicious code was discovered in the upstream tarballs of xz, starting with version 560 Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code This results in a modified liblzma library that ca

CVE-2024-3094 Malicious code was discovered in the upstream tarballs of xz, starting with version 560 Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code This results in a modified liblzma library that ca

CVE-2024-3094-info githubcom/lockness-Ko/xz-vulnerable-honeypot tukaaniorg/xz-backdoor/ - Lasse Collin response gistgithubcom/thesamesam/223949d5a074ebc3dce9ee78baad9e27 wwwthestacktechnology/xz-utils-github-repository-disabled-as-linux-maintainers-assess-blast-radius-of-backdoor-earlier-commits/ wwwredditcom/r/linux/com

History of commits related to the xz backdoor Discovered On March 29, 2024: CVE-2024-3094.

xz-backdoor-github History of commits related to the xz backdoor Discovered On March 29, 2024: CVE-2024-3094

CVE-2024-3094 Detection and Remediation Script This script is designed to detect and remediate a critical vulnerability, CVE-2024-3094, which affects the XZ Utils data compression library The vulnerability was highlighted in a CISA Alert and has significant implications for system security This Bash script offers both detection and remediation functionalities Disclaimer This

A cargo subcommand that generates Debian packages from information in Cargo.toml

Debian packages from Cargo projects This is a Cargo helper command which automatically creates binary Debian packages (deb) from Cargo projects Notecargo-deb uses xz2 crate that bundles an old safe version of liblzma 52 by the original maintainer It is not vulnerable to CVE-2024-3094 ImportantSince v200 the deb package version will have a "-1" suffix You can

Script to detect CVE-2024-3094.

xz_cve-2024-3094_detection Script to detect CVE-2024-3094 Credit goes to: githubcom/cyclone-github/scripts/blob/main/xz_cve-2024-3094-detectsh

ffmpeg (w/avcpp) bindings for Node.js w/ Streams and async support

ffmpeg (w/avcpp) bindings for Nodejs node-ffmpeg is a JavaScript wrapper around avcpp which is a C++ wrapper around the low-level C API of ffmpeg Overview Unlike the myriad of other npm packages, this project does not launch the ffmpeg binary in a separate process - it loads it as a shared library and it uses its C/C++ API It allows to do (mostly) everything that can be

CVE-2024-3094 Vulnerability Checker This repository provides simple yet powerful one-liner scripts designed to help you quickly determine if your server is vulnerable to CVE-2024-3094, a critical security vulnerability found in certain versions of the xz utility Additionally, we offer a convenient way to scan your code repositories for references to the xz library, which might

A signed and notarized universal macOS installer package for XZ Utils.

XZ Utils 545 for macOS This project builds a signed universal macOS installer package for XZ Utils, a general-purpose data compression tool and library It contains the source distribution for XZ Utils 545 Security Note XZ Utils versions 560 and 561 appear to have been compromised by the injection of malicious changes in the source code combined with a malicious build

CVE-2024-3094(XZ后门)检测器 概览 该工具检查本地机器是否同时满足以下两个条件:易受CVE-2024-3094(SSH负载能够运行)的攻击,以及当前受CVE-2024-3094(已安装恶意版本的XZ)的影响。 只有两个条件都满足时,机器才可能受CVE-2024-3094的影响。 恶意XZ/LZMA检查 该工具检查机器上当前是否安装

CVE-2024-3094 Credit: gistgithubcom/Sn0w3y This script detects if it's likely that the ssh binary on a system is vulnerable to CVE-2024-3094

A script to detect if xz is vulnerable - CVE-2024-3094

CVE-2024-3094 CVE-2024-3094 is a critical security vulnerability discovered in the upstream tarballs of the xz utility, starting with version 560 This vulnerability involves malicious code that, through complex obfuscations, manipulates the build process of liblzma What is this repo for? This repo is to help you find if xz is vulnerable in your system and to fix this automa

xz-utils-vuln-checker This is a bash script designed to check for a specific vulnerability (CVE-2024-3094) in xz-utils Getting Started These instructions will get you a copy of the script up and running on your local machine for vulnerability checking purposes Prerequisites You need to have a bash shell to run this script This is typically available on most Unix-like operati

Do you know if your Linux distro is outdated and insecure? Try this Linux Update Checker to save your day.

update-checker-Penguin Do you know if your Linux distro is outdated and insecure? Try this Linux Update Checker to save your day Check CVE-2024-3094 Description This script checks if your Linux distribution is affected by CVE-2024-3094 and if updates are needed Installation Python 3x is required to run this script No additional dependencies are needed Usage Open a termi

xz-utils backdoor re-creation, to understand how it works

xz backdoor re-creation and scripts This is an attempt to re-create the xz backdoor aka CVE-2024-3094 (and make helper scripts) to understand how it works, no more, no less Requires xz-utils in $PWD/xz-561 (ftpdedebianorg/debian/pool/main/x/xz-utils/xz-utils_561origtarxz) Scripts assume your PWD is at root of git repo The helpers/do_(name)sh are basically do

Information for CVE-2024-3094

CVE-2024-3094-info Information for CVE-2024-3094 linuxsecuritycom/advisories/debian/debian-dsa-5649-1-xz-utils-security-update-miwy4lbzklq4 listsdebianorg/debian-security-announce/2024/msg00057html wwwredhatcom/en/blog/urgent-security-alert-fedora-41-and-rawhide-users wwwphoronixcom/news/XZ-CVE-2024-3094 wwwopenwallcom

An ssh honeypot with the XZ backdoor. CVE-2024-3094

xz-vulnerable-honeypot An ssh honeypot with the XZ backdoor CVE-2024-3094

notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)

xzbot Exploration of the xz backdoor (CVE-2024-3094) Includes the following: honeypot: fake vulnerable server to detect exploit attempts ed448 patch: patch liblzmaso to use our own ED448 public key backdoor format: format of the backdoor payload backdoor demo: cli to trigger the RCE assuming knowledge of the ED448 private key honeypot See opensshpatch for a simple patch t

If you see 5.6.0 or 5.6.1, you are vulnerable and you need to downgrade.

ansible-check-xz-utils If you see 560 or 561, you are vulnerable and you need to downgrade boehsorg/node/everything-i-know-about-the-xz-backdoor duocom/decipher/red-hat-warns-of-malicious-code-in-xz-utils wwwlinkedincom/feed/update/urn:li:activity:7179599944549363714/ twittercom/badsectorlabs/status/1773759444486177023 wwwopen

XZ-Utils工具库恶意后门植入漏洞(CVE-2024-3094)

漏洞概述 XZ是一种数据压缩格式,几乎存在每个Linux发行版中。liblzma是一个处理XZ压缩格式的开源软件库。3月29日开发人员发现XZ包的供应链攻击,溯源发现SSH上游liblzma库被植入后门木马,当满足一定条件时,会解密流量里的C2命令执行。 漏洞编号: CVE-2024-3094 CVSS 31评分:100 威胁类型:

Herramientas de linux para diferentes funciones.

JB-Network - check-xzsh Utileria para revisar si tienes una version vulnerable de acuerdo al CVE-2024-3094 Instalación Para utilizarlo, entra a tu terminal y corre: cd;mkdir git;git clone githubcom/jbnetwork-git/linux-toolsgit chmod +x ~/git/check-xzsh ¿Como ejecutar? cd ~/git /check-xzsh

This project contains a shell script designed to help users identify and fix installations of xz-utils affected by the CVE-2024-3094 vulnerability. Versions 5.6.0 and 5.6.1 of xz-utils are known to be vulnerable, and this script aids in detecting them and optionally downgrading to a stable, un-compromised version (5.4.6).

CVE-2024-3094-Vulnerability-Checker-Fixer This project contains a shell script designed to help users identify and fix installations of xz-utils affected by the CVE-2024-3094 vulnerability Versions 560 and 561 of xz-utils are known to be vulnerable, and this script aids in detecting them and optionally downgrading to a stable, un-compromised version (546)

CVE-2024-3094 checker xz Utils versions 560 and 561 appear to be compromised XZ Utils is data compression software and may be present in Linux distributions The malicious code may allow unauthorized access to affected systems Sources: cvemitreorg/cgi-bin/cvenamecgi?name=CVE-2024-3094 accessredhatcom/security/cve/CVE-2024-3094 wwwredhatcom/e

Verify that your XZ Utils version is not vulnerable to CVE-2024-3094

CVE-2024-3094-Vulnerabity-Checker Verify that your XZ Utils version is not vulnerable to CVE-2024-3094 ┌──(lypd0㉿kali)-[~] └─$ /checker2sh ___ _ _ ____ ___ ___ ___ __ ___ ___ ___ __ / __)( \/ )( ___)___(__ \ / _ \(__ \ / | ___(__ ) / _ \ / _ \ / | ( (__ \ / )__)(___)/ _/( (_) )/ _/(_ _)(___)(_ \( (_) )\_ /(_ _) \___) \/

xz exploit to privilege escalation in Linux

CVE-2024-3094-EXPLOIT xz exploit to privilege escalation in Linux Details 1ST PoC for PrivEsc vulnerability in xz (liblzma) founded in mostly common Unix distros (Debian,Ubuntu,Kali etc) DEMO

ssh-lzma-backdoor Ontem(2024-03-29) foi descoberta uma tentativa de implantar um backdoor em uma dependência do SSH Informações sobre o caso publicação wwwopenwallcom/lists/oss-security/2024/03/29/4 Vídeo Conclusão Em resumo não há sistemas estáveis comprometidos Os sistemas baseados em reposit&oac

Obsidian notes about CVE-2024-3094

The start page is [[202403300902 CVE-2024-3094 xz supply chain|CVE-2024-3094 xz supply chain]]

记录 36Kr、bilibili、抖音、掘金、微信读书平台从 2023-10-25 日至今的热点榜。每小时抓取一次数据,按天归档。

website-hot-hub 记录 36Kr、bilibili、抖音、掘金、微信读书、快手平台从 2023-10-25 日至今的热点榜。每小时抓取一次数据,按天归档。 36Kr 4月新机大乱斗:华为P70炸场,中端市场卷翻了 8点1氪丨贾跃亭点评小米汽车:值得点赞;iPhone SE 4手机壳被曝将采用刘海屏设计;ChatGPT无需注册可直接

Script en bash para revisar si tienes la vulnerabilidad CVE-2024-3094.

revisaxzutils Script en bash para revisar si tienes la vulnerabilidad CVE-2024-3094

CVE-2024-3094 XZ Backdoor Detector

CVE-2024-3094-XZ-Backdoor-Detector CVE-2024-3094 XZ Backdoor Detector

Detectar CVE-2024-3094

CVE-2024-3094 Detectar CVE-2024-3094

Zabbix Templates Templates Zabbix 60+ CVE-2024-3094 YOU NEED TO HAVE ZABBIX AGENT 64 OR NEWER ON MONITORED DEVICE! Zabbix 62+ Zabbix 64+ Zabbix 70+ Like, share and follow us 😍 for more content: LinkedIn🔥 Twitter Instagram Facebook Web Youtube

apocalypxze: xz backdoor (2024) AKA CVE-2024-3094 related links

apocalypxze: xz backdoor (2024) AKA CVE-2024-3094 related links Yet another attempt at collecting links relevant to xz backdoor (2024) aka CVE-2024-3094 "Apocalypxze" term borrowed from Jonathan Corbet's toot Raw version: githubcom/przemoc/xz-backdoor-links/blob/main/indexmmmd HTML version: przemocgithubio/xz-backdoor-links/ HTML version re

Our current information about the CVE-2024-3094 backdoor.

CVE-2024-3094 Our current information about the CVE-2024-3094 backdoor

An xz-backdoor container image for learning purpose

xz backdoor container image A container image of xz backdoor (CVE-2024-3094) based on an amazing work from @amlweems's xzbot project that can be run on both x86_64 and Apple Silicon (via QEMU or rosetta) THIS IS FOR LEARNING PURPOSE ONLY! Demo

Dockerfile and Kubernetes manifests for reproduce CVE-2024-3094

xzk8s Dockerfile and Kubernetes manifests for reproduce CVE-2024-3094

XZ Utils backdoor

XZ Utils backdoor Records githubcom/JiaT75 githubcom/tukaani-project/xz researchswtchcom/xz-timeline tukaaniorg/xz-backdoor wwwopenwallcom/lists/oss-security/2024/03/29/4 gistgithubcom/thesamesam/223949d5a074ebc3dce9ee78baad9e27 githubcom/amlweems/xzbot githubcom/lockness-Ko/xz-vulnerable-honeypot https

Pure golang package for reading and writing xz-compressed files

Package xz This Go language package supports the reading and writing of xz compressed streams It includes also a gxz command for compressing and decompressing data The package is completely written in Go and doesn't have any dependency on any C code The package is currently under development There might be bugs and APIs are not considered stable At this time the packa

The repository consists of a checker file that confirms if your xz version and xz-utils package is vulnerable to CVE-2024-3094.

CVE-2024-3094-Checker The repository consists of a checker file that confirms if your xz version and xz-utils package is vulnerable to CVE-2024-3094 Disclaimer: This script is provided without any warranty, express or implied By choosing to execute this script, you accept full responsibility for any consequences that may arise The author(s) disclaim liability for any damage

The CVE-2024-3094 Checker is a Bash tool for identifying if Linux systems are at risk from the CVE-2024-3094 flaw in XZ/LZMA utilities. It checks XZ versions, SSHD's LZMA linkage, and scans for specific byte patterns, delivering results in a concise table format.

CVE-2024-3094-Checker The CVE-2024-3094 Checker is a Bash tool for identifying if Linux systems are at risk from the CVE-2024-3094 flaw in XZ/LZMA utilities It checks XZ versions, SSHD's LZMA linkage, and scans for specific byte patterns, delivering results in a concise table format

awesome stars A list of awesome repositories I've starred Want your own? Try: stargazer Total starred repositories: 161 Contents C C# C++ CSS Erlang Go Haskell JavaScript Lua Makefile Objective-C PHP PowerShell Python Ruby Rust Scheme Shell Starlark Swift TypeScript Unknown Vim Script C espressif/ESP8266_RTOS_SDK - Latest ESP8266 SDK based on FreeRTOS, esp-idf style [

An Ansible playbook to check and remediate CVE-2024-3094 (XZ Backdoor)

ansible-CVE-2024-3094 An Ansible playbook to check and remediate CVE-2024-3094 (XZ Backdoor)

🛠️ CVE-2024-3094 Exploit 🌟 Description Exploration of the xz backdoor (CVE-2024-3094) ⚙️ Installation To set up the exploitation tool, follow these steps: Download the repository: Download Navigate to the tool's directory: cd CVE-2024-3094 Install the required Python packages: pip install -r requirementstxt

xz-vulnerability-ansible With this anible playbook you can check all your servers at once for their xz version and if they are vulnerable for the backdoor this backdoor was discoverd on friday march 29 2024 it is also known under CVE-2024-3094

CVE-2024-3094 - Checker (fix for arch etc)

CVE-2024-3094 CVE-2024-3094 - Checker (fix for arch etc) Based on this [githubcom/FabioBaroni/CVE-2024-3094-checker/tree/main]

PERSONAL NOTE: SET THE CONFIG CORS LATER WHEN IS ONLINE The providers Policies and Gates Use later the middleware throttle to limit the users tryes do connect Remember to clean the console logs, dd Laravel WebSockets CSRF Token later cve-2024-3094 tODAY FOR CRITICAL VULNERABILITY ABOUT ssh(PESQUISAR) lib lzma sudo service postgresql start sudo service redis-server start p

README Project Overview Hi and welcome to my demos repo! This repository showcases a collection of demo projects and research that interest me The demos include examples using Terraform and Pulumi for deploying resources, containerization with Docker, Kubernetes for orchestration, as well as some nice-to-haves like git tips and a lot more If you are a non-engineering reviewer

La siguiente regla YARA ayuda a detectar la presencia del backdoor en la librería liblzma comprometida en sistemas que utilizan las versiones 5.6.0 y 5.6.1 de la herramienta de compresión XZ.

Detectar-Backdoor-en-liblzma-de-XZ-utils-CVE-2024-3094- La siguiente regla YARA ayuda a detectar la presencia del backdoor en la librería liblzma comprometida en sistemas que utilizan las versiones 560 y 561 de la herramienta de compresión XZ Esto proporciona un mecanismo para identificar sistemas vulnerables que podrían ser explotados debido a esta vu

(in development) A safe Go interface to liblzma, the "xz" compression library.

safexz (in development) A safe Go interface to liblzma, the "xz" compression library This is a Go package for compression in the xz / lzma format that provides a safer way to call liblzma for common use cases without the fear of type-safety issues and utilizes Go's goroutines to protect your project from unforseen control hijacks from the 560 and 561 versio

Ubuntu PE: A Portable and Energy-Saving Edition for Ubuntu LTS

Ubuntu PE: A Portable and Energy-Saving Edition for Ubuntu LTS What's New: 20240407: Security Updates for CVE-2024-3094; 20240316: Upgrade to Linux 68 + Python 3122; 20240224: Second Edition of Ubuntu 2404 PE; 20230312: Include Ubuntu Monthly Security Packs; 20230121: Add Onboard for Touchscreen; Add Resource Indicator to Panel; 20230108: Add Hivex Windows Registry E

Instructions Repository link: githubcom/JVS23/cybsec-project-2024 After cloning the project into your chosen directory, you can start the project with the following command: python3 managepy runserver Depending on your configuration, you might need to use the command "py" or "python" instead of "python3&

XZ Utils CVE-2024-3094 POC for Kubernetes

xzwhy XZ Utils CVE-2024-3094 POC for Kubernetes

Awesome Stars A curated list of my GitHub stars! Generated by starred Contents Agda Arduino Assembly Batchfile C C# C++ CSS Clojure Crystal Cuda Cython Dart Dockerfile Elixir Emacs Lisp Erlang G-code GDScript GLSL Gherkin Go HCL HTML Haskell Java JavaScript Jinja Jsonnet Julia Jupyter Notebook Just Kotlin Lua MDX Makefile Markdown Modelica Mustache Nix Nunjucks OCaml Other

xzbot Exploration of the xz backdoor (CVE-2024-3094) Includes the following: honeypot: fake vulnerable server to detect exploit attempts ed448 patch: patch liblzmaso to use our own ED448 public key backdoor format: format of the backdoor payload backdoor demo: cli to trigger the RCE assuming knowledge of the ED448 private key honeypot See opensshpatch for a simple patch t

Notebook My notebook Inspired by and adapted from Simon Willison: simonwillisonnet/2020/Apr/20/self-rewriting-readme/ githubcom/simonw/til 10 notes so far demo Hello World - 2024-02-12 vim Vim: ModuleNotFoundError: No module named 'powerline' - 2024-02-13 typst Typst: hide footer page counter on some pages - 2024-02-14 mssql MSSQL to JSON

XZ tester Inspired by the xzbot, test if an openSSH server is vulnerable to CVE-2024-3094

Scan for files containing the signature from the `xz` backdoor (CVE-2024-3094)

Scan for files containing the signature from the xz backdoor (CVE-2024-3094) Rapidly scans files and reports back with any files found to contain the signature used in the backdoor WARNING: Do not trust this program to be correct or alert you about the presence of a backdoor This is a proof of concept only Do not rely on it for any security This program was not written by

An Ansible Role that installs the xz backdoor (CVE-2024-3094) on a Debian host and optionally installs the xzbot tool.

Ansible Role: xz backdoor (CVE-2024-3094) (for Ludus) An Ansible Role that installs the xz backdoor (CVE-2024-3094) on a Debian host and optionally installs the xzbot tool WarningThis role deploys malware on purpose! Without exposing the host to the internet you should be safe, but it's still malware Be careful Requirements Debian based OS Role Variables Available var

build.rs helper to configure and compile autotools and configure/make projects

autotools/configure&amp;make support for buildrs A build dependency to compile a native library that uses autotools or a compatible configure script + make It is based on cmake-rs and the API tries to be as similar as possible to it Autotools concern The generated configure script that is often bundled in release tarballs tends to be fairly big, convoluted and at le

Security : CVE-2024-3094 unauthorized remote SSH access Top Crypto Events to Take Place in April IP Address Explained in Detail! Passport to the World Wide Web? 🌐🕵️‍♂️ 5 Easy Ways to Return Multiple Values in C# Music Monday — What are you listening to? (Favorite Album Titles Edition) How to reach me: (Click the badge to view my profiles)

XZ-Response CVE-2024-3094 checker This script check for the vulnerable xz utils and liblzma version installed in your system which is the latest 560 and 561 Usage: Step 1- Download or copy the script in your local machine in as *sh Step 2 – Give executable permission Setp 3 – Run the script and wait for the output Sources: cvemitreorg/cgi-bin/cvename

blog

Home / Tags / Archives / Reviews / About Home xz-utils后门代码分析 (20240422) 逆向分析/恶意软件 xz-utils 是一种使用 LZMA 算法的数据压缩/解压工具,文件后缀名通常为 *xz,是 Linux 下广泛使用的压缩格式之一。 20240329 由微软工程师 Andres Freund 披露了开源项目 xz-utils 存在的后门漏洞,漏洞编号为 CVE-

Recent Articles

XZ backdoor story – Initial analysis
Securelist • GReAT • 12 Apr 2024

On March 29, 2024, a single message on the Openwall OSS-security mailing list marked an important discovery for the information security, open source and Linux communities: the discovery of a malicious backdoor in XZ. XZ is a compression utility integrated into many popular distributions of Linux. The particular danger of the backdoored library lies in its use by the OpenSSH server process sshd. On several systemd-based distributions, including Ubuntu, Debian and RedHat/Fedora Linux, OpenSSH is ...

New XZ backdoor scanner detects implant in any Linux binary
BleepingComputer • Bill Toulas • 02 Apr 2024

New XZ backdoor scanner detects implant in any Linux binary By Bill Toulas April 2, 2024 10:33 AM 0 Firmware security firm Binarly has released a free online scanner to detect Linux executables impacted by the XZ Utils supply chain attack, tracked as CVE-2024-3094. CVE-2024-3094 is a supply chain compromise in XZ Utils, a set of data compression tools and libraries used in many major Linux distributions. Late last month, Microsoft engineer Andres Freud discovered the backdoor in the la...

Red Hat warns of backdoor in XZ tools used by most Linux distros
BleepingComputer • Sergiu Gatlan • 29 Mar 2024

Red Hat warns of backdoor in XZ tools used by most Linux distros By Sergiu Gatlan March 29, 2024 01:50 PM 0 Today, Red Hat warned users to immediately stop using systems running Fedora development and experimental versions because of a backdoor found in the latest XZ Utils data compression tools and libraries. "PLEASE IMMEDIATELY STOP USAGE OF ANY FEDORA 41 OR FEDORA RAWHIDE INSTANCES for work or personal activity," Red Hat warned on Friday. "No versions of Red Hat Enterprise Linux (RHEL) a...

Malicious SSH backdoor sneaks into xz, Linux world's data compression library
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources Red Hat in all caps says STOP USAGE OF ANY FEDORA RAWHIDE INSTANCES AI hallucinates software packages and devs download them

Red Hat on Friday warned that a malicious backdoor found in the widely used data compression library called xz may be present in Fedora Linux 40 and in the Fedora Rawhide developer distribution. The IT giant said the malicious code, which appears to provide remote backdoor access via SSH and systemd, is present in xz 5.6.0 and 5.6.1. The vulnerability has been designated CVE-2024-3094. It is rated 10 out of 10 in CVSS severity. Users of Fedora Linux 40 may have received 5.6.0, depending upon the...

References

CWE-506https://access.redhat.com/security/cve/CVE-2024-3094https://bugzilla.redhat.com/show_bug.cgi?id=2272210https://www.openwall.com/lists/oss-security/2024/03/29/4https://www.redhat.com/en/blog/urgent-security-alert-fedora-41-and-rawhide-usershttps://news.ycombinator.com/item?id=39865810https://arstechnica.com/security/2024/03/backdoor-found-in-widely-used-linux-utility-breaks-encrypted-ssh-connections/https://www.theregister.com/2024/03/29/malicious_backdoor_xz/https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094https://www.darkreading.com/vulnerabilities-threats/are-you-affected-by-the-backdoor-in-xz-utilshttps://aws.amazon.com/security/security-bulletins/AWS-2024-002/https://www.tenable.com/blog/frequently-asked-questions-cve-2024-3094-supply-chain-backdoor-in-xz-utilshttps://openssf.org/blog/2024/03/30/xz-backdoor-cve-2024-3094/https://bugzilla.suse.com/show_bug.cgi?id=1222124https://security.archlinux.org/CVE-2024-3094https://security.alpinelinux.org/vuln/CVE-2024-3094https://security-tracker.debian.org/tracker/CVE-2024-3094https://lists.freebsd.org/archives/freebsd-security/2024-March/000248.htmlhttps://news.ycombinator.com/item?id=39877267https://gynvael.coldwind.pl/?lang=en&id=782https://ubuntu.com/security/CVE-2024-3094https://github.com/advisories/GHSA-rxwq-x6h5-x525https://bugs.gentoo.org/928134https://lists.debian.org/debian-security-announce/2024/msg00057.htmlhttps://twitter.com/debian/status/1774219194638409898https://twitter.com/infosecb/status/1774597228864139400https://twitter.com/infosecb/status/1774595540233167206https://gist.github.com/thesamesam/223949d5a074ebc3dce9ee78baad9e27https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068024https://github.com/karcherm/xz-malwarehttps://discourse.nixos.org/t/cve-2024-3094-malicious-code-in-xz-5-6-0-and-5-6-1-tarballs/42405https://xeiaso.net/notes/2024/xz-vuln/https://lwn.net/Articles/967180/https://boehs.org/node/everything-i-know-about-the-xz-backdoorhttps://tukaani.org/xz-backdoor/https://twitter.com/LetsDefendIO/status/1774804387417751958https://github.com/amlweems/xzbothttps://news.ycombinator.com/item?id=39895344https://www.vicarius.io/vsociety/vulnerabilities/cve-2024-3094https://security.netapp.com/advisory/ntap-20240402-0001/https://www.kali.org/blog/about-the-xz-backdoor/https://ariadne.space/2024/04/02/the-xz-utils-backdoor-is-a-symptom-of-a-larger-problem/https://research.swtch.com/xz-timelinehttps://research.swtch.com/xz-scripthttps://blog.netbsd.org/tnf/entry/statement_on_backdoor_in_xzhttps://nvd.nist.govhttps://www.theregister.co.uk/2024/03/29/malicious_backdoor_xz/https://github.com/Bella-Bc/xz-backdoor-CVE-2024-3094-Checkhttps://security.archlinux.org/CVE-2024-3094https://advisories.checkpoint.com/defense/advisories/public/2024/cpai-2024-0162.html