POC详情: 0634ebaf341da5fd4080b79a1dd648a2f7209938

来源
关联漏洞
标题: xz 安全漏洞 (CVE-2024-3094)
描述:xz是一个应用软件。用于支持读取和写入xz压缩流。 XZ Utils 5.6.0版本和5.6.1版本存在安全漏洞,该漏洞源于允许攻击者嵌入恶意代码。
描述
Threat intelligence report analyzing the xz-utils backdoor vulnerability (CVE-2024-3094)
介绍
# Threat Intelligence Report: CVE-2024-3094 – XZ Utils Backdoor

This repository contains a threat intelligence report analyzing **CVE-2024-3094**, a high-profile backdoor vulnerability discovered in the `xz-utils` compression tool in 2024.


CVE-2024-3094 is a severe supply chain compromise where a malicious backdoor was inserted into the `xz` compression library, affecting certain versions (5.6.0 and 5.6.1). The backdoor allowed remote code execution in SSH authentication via `systemd`, posing a critical risk to Linux systems.


- **Vulnerability ID**: CVE-2024-3094
- **Severity**: Critical (CVSS: 10.0)
- **Affected Software**: xz-utils 5.6.0 and 5.6.1
- **Exploitation Method**: Backdoor via tampered build scripts
- **Discovery**: March 2024 by Andres Freund
- **Impact**: Remote code execution, privilege escalation, supply chain compromise


- `threat-intel-cve-2024-3094.pdf`: Full PDF report with technical analysis, timeline, indicators of compromise, and detection guidance.


- Immediately downgrade to a non-compromised version (5.4.x)
- Validate your software supply chain
- Monitor for unusual activity in SSH authentication
- Apply YARA or Sigma rules targeting malicious behavior patterns


Written by Owais Sarwar
---


文件快照

[4.0K] /data/pocs/0634ebaf341da5fd4080b79a1dd648a2f7209938 ├── [1.6K] CVE-2024-3094-xz-backdoor.md ├── [ 282] indicators-of-compromise.txt. └── [1.2K] README.md 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。