Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-3094
HistoryMar 29, 2024 - 12:00 a.m.

CVE-2024-3094

2024-03-2900:00:00
ubuntu.com
ubuntu.com
28
malicious code
xz
version 5.6.0
liblzma
build process
upstream tarballs
backdoor
sshd
data interaction
unix

CVSS3

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

AI Score

9.6

Confidence

High

EPSS

0.144

Percentile

95.8%

Malicious code was discovered in the upstream tarballs of xz, starting with
version 5.6.0. Through a series of complex obfuscations, the liblzma build
process extracts a prebuilt object file from a disguised test file existing
in the source code, which is then used to modify specific functions in the
liblzma code. This results in a modified liblzma library that can be used
by any software linked against this library, intercepting and modifying the
data interaction with this library.

Notes

Author Note
Priority reason: Results in a backdoor in sshd
mdeslaur The affected version of xz-utils was only in noble-proposed, and was removed before migrating to noble itself. No released versions of Ubuntu were affected by this issue.

CVSS3

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

AI Score

9.6

Confidence

High

EPSS

0.144

Percentile

95.8%