关联漏洞
介绍
# CVE-2024-3094
## XZ-Utils Vulnerability Checker and Fixer
This Bash script checks for vulnerable versions of xz-utils installed on your system and offers to replace them with a stable, uncompromised version.
### Requirements
- `wget`
- `tar`
- `make`
- `sudo`
### Usage
1. Ensure you have the required dependencies installed.
2. Run the script with the following command:
```bash
wget -O - https://raw.githubusercontent.com/Fractal-Tess/CVE-2024-3094/main/CVE-2024-3094-checker.sh | sudo bash
```
or
```bash
curl -L https://raw.githubusercontent.com/Fractal-Tess/CVE-2024-3094/main/CVE-2024-3094-checker.sh | sudo bash
```
or
```bash
git clone https://github.com/Fractal-Tess/CVE-2024-3094
cd CVE-2024-3094
chmod +x CVE-2024-3094-checker.sh
sudo ./CVE-2024-3094-checker.sh
```
### Description
The script performs the following steps:
1. Checks if xz-utils is installed.
2. Checks the version of xz-utils.
3. If the version is vulnerable (5.6.0 or 5.6.1), it prompts the user to install the stable version (5.4.6) from source.
4. Downloads the stable version from the official GitHub repository.
5. Verifies the integrity of the downloaded file via a sha256sum checksum.
6. Configures, compiles, and installs the stable version.
7. Notifies the user about the successful installation and prompts them to uninstall the vulnerable version using their package manager.
### Note
- It's recommended to uninstall the vulnerable version manually after installing the stable version to ensure system integrity.
### Disclaimer
This script is provided as-is and without warranty. Use at your own risk.
文件快照
[4.0K] /data/pocs/514e305d7896a0afee8e66ce6fb86eca3553f6e7
├── [1.7K] CVE-2024-3094-checker.sh
└── [1.6K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。