id: CVE-2024-3094 info: name: XZ - Embedded Malicious Code author: pdteam severity: critical description: | Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library. remediation: | Downgrade XZ Utils to version 5.4.x or earlier that does not contain the malicious backdoor code. impact: | Attackers can intercept and modify data processed by liblzma, leading to data tampering and potential data integrity breaches. reference: - https://www.openwall.com/lists/oss-security/2024/03/29/4 - https://access.redhat.com/security/cve/CVE-2024-3094 - https://arstechnica.com/security/2024/03/backdoor-found-in-widely-used-linux-utility-breaks-encrypted-ssh-connections/ - https://aws.amazon.com/security/security-bulletins/AWS-2024-002/ - https://bugzilla.redhat.com/show_bug.cgi?id=2272210 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H cvss-score: 10 cve-id: CVE-2024-3094 cwe-id: CWE-506 epss-score: 0.858 epss-percentile: 0.99362 cpe: cpe:2.3:a:tukaani:xz:5.6.0:*:*:*:*:*:*:* metadata: verified: true vendor: tukaani product: xz tags: cve,cve2024,local,code,xz,backdoor,tukaani,vuln self-contained: true code: - engine: - sh - bash source: | # find path to liblzma used by sshd path="$(ldd $(which sshd) | grep liblzma | grep -o '/[^ ]*')" # does it even exist? if [ "$path" == "" ] then echo probably not vulnerable exit fi # check for function signature if hexdump -ve '1/1 "%.2x"' "$path" | grep -q f30f1efa554889f54c89ce5389fb81e7000000804883ec28488954241848894c2410 then echo probably vulnerable else echo probably not vulnerable fi matchers: - type: word words: - "probably vulnerable" extractors: - type: dsl dsl: - response # digest: 490a004630440220282d9efc4bdabb6515ee014564f5e5fbcd69790ad8d2f442cc991f54232689d502204a56bec5332a0ef66aa46d7a969fcfad1fc39072488d6945b5737a8ef9911dac:922c64590222798bb761d5b6d8e72950