Article Details

Scrape Timestamp (UTC): 2024-03-30 05:24:11.481

Source: https://thehackernews.com/2024/03/urgent-secret-backdoor-found-in-xz.html

Original Article Text

Click to Toggle View

Urgent: Secret Backdoor Found in XZ Utils Library, Impacts Major Linux Distros. RedHat on Friday released an "urgent security alert" warning that two versions of a popular data compression library called XZ Utils (previously LZMA Utils) have been backdoored with malicious code designed to allow unauthorized remote access. The software supply chain compromise, tracked as CVE-2024-3094, has a CVSS score of 10.0, indicating maximum severity. It impacts XZ Utils versions 5.6.0 (released February 24) and 5.6.1 (released March 9). "Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code," the IBM subsidiary said in an advisory. "This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library." Specifically, the nefarious code baked into the code is designed to interfere with the sshd daemon process for SSH (Secure Shell) via the systemd software suite, and potentially enable a threat actor to break sshd authentication and gain unauthorized access to the system remotely "under the right circumstances." Microsoft security researcher Andres Freund has been credited with discovering and reporting the issue on Friday. The heavily obfuscated malicious code is said to have been introduced over a series of four commits to the Tukaani Project on GitHub by a user named JiaT75. "Given the activity over several weeks, the committer is either directly involved or there was some quite severe compromise of their system," Freund said. "Unfortunately the latter looks like the less likely explanation, given they communicated on various lists about the 'fixes.'" Microsoft-owned GitHub has since disabled the XZ Utils repository maintained by the Tukaani Project "due to a violation of GitHub's terms of service." There are currently no reports of active exploitation in the wild. Evidence shows that the packages are only present in Fedora 41 and Fedora Rawhide, and do not impact Red Hat Enterprise Linux (RHEL), Debian Stable, Amazon Linux, and SUSE Linux Enterprise and Leap. Out of an abundance of caution, Fedora Linux 40 users have been recommended to downgrade to a 5.4 build. Some of the other Linux distributions impacted by the supply chain attack are below - The development has prompted the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to issue an alert of its own, urging users to downgrade XZ Utils to an uncompromised version (e.g., XZ Utils 5.4.6 Stable). The Strategic Guide to Cloud Security Unlock practical steps to securing everything you build and run in the cloud. Goodbye, Atlassian Server. Goodbye… Backups? Protect your data on Atlassian Cloud from disaster with Rewind's daily backups and on-demand restores. Take Action Fast with Censys Search for Security Teams Stay ahead of advanced threat actors with best-in-class Internet intelligence from Censys Search.

Daily Brief Summary

MALWARE // Critical Malware Discovered in XZ Utils Compromise Linux Systems

Secret backdoor discovered in XZ Utils library, affects major Linux distributions.

RedHat issued an urgent security alert for a supply chain compromise in versions 5.6.0 and 5.6.1 of XZ Utils, with a CVSS score of 10.0.

The malicious code in the compromised library intercepts data interactions, potentially impacting sshd daemon and systemd, facilitating unauthorized remote system access.

Microsoft security researcher Andres Freund identified the sophisticated obfuscation and reported the hidden malicious code.

The GitHub repository for XZ Utils has been disabled after a series of suspicious commits linked to a user named JiaT75.

While there's no evidence of active exploitation, users of Fedora Linux 40 are advised to downgrade XZ Utils to avoid potential security risks.

CISA has issued an alert recommending downgrading to a secure XZ Utils version, impacting distributions including Fedora 41 and Fedora Rawhide; Red Hat Enterprise Linux (RHEL), Debian Stable, Amazon Linux, and SUSE Linux Enterprise, and Leap remain unaffected.