CVE-2024-3094

Scores

EPSS

0.850high85.0%
0%20%40%60%80%100%

Percentile: 85.0%

CVSS

10.0critical3.x
0246810

CVSS Score: 10.0/10

All CVSS Scores

CVSS 3.x
10.0

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Description

Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0.
Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

anchore_overridesdebiannvdubuntu

CWEs

506CWE-506

Related Vulnerabilities

Exploits

Exploit ID: CVE-2024-3094

Source: github-poc

URL: https://github.com/ElinaNotElina/cve-2024-3094-analysis

Vulnerable Software (10)

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:tukaani:xz:*:*:*:*:*:*:*:*",          "versionEndExcluding": "5.6.2",          "versionStartIncluding": "5.6.0...

Source: anchore_overrides

Type: Configuration

Product: xz-utils

Operating System: ubuntu focal 20.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: xz-utils

Operating System: ubuntu jammy 22.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: xz-utils

Operating System: ubuntu mantic 23.10

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: xz-utils

Operating System: ubuntu noble 24.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: xz-utils

Operating System: debian

Trait:
{  "fixed": "5.6.1+really5.4.5-1"}

Source: debian

Type: Configuration

Product: xz-utils

Operating System: debian bookworm 12

Trait:
{  "unaffected": true}

Source: debian

Type: Configuration

Product: xz-utils

Operating System: debian bullseye 11

Trait:
{  "unaffected": true}

Source: debian

Type: Configuration

Product: xz-utils

Operating System: debian buster 10

Trait:
{  "unaffected": true}

Source: debian

Type: Configuration

Vendor: *

Product: xz

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:tukaani:xz:5.6.0:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:tukaani:xz:5.6.1:*:*:*:*:*:*:*",      "vulner...

Source: nvd

End of list