Diamond Member Pelican Press 0 Posted April 2 Diamond Member Share Posted April 2 Open source alert over intentionally placed ********* Users of the open source This is the hidden content, please Sign In or Sign Up data compression library may have narrowly avoided falling victim to a major supply chain *******, after evidence of an apparently intentionally placed This is the hidden content, please Sign In or Sign Up in the code was revealed. The malicious code, embedded in versions 5.6.0 and 5.6.1 of the library, enabled unauthorised access to affected Linux distributions, and over the past few days has been the subject of alerts This is the hidden content, please Sign In or Sign Up and the US This is the hidden content, please Sign In or Sign Up (CISA). Red Hat explained that the malicious build interferes with authentication via This is the hidden content, please Sign In or Sign Up (SSH). “Under the right circumstances, this interference could potentially enable a malicious actor to break SSH authentication and gain unauthorised access to the entire system remotely,” it said in its advisory. This is the hidden content, please Sign In or Sign Up , the ultimate goal of the ********* is to enable a malicious actor to inject code into the OpenSSH server running on the target machine and enable specific remote attackers to send arbitrary payloads via SSH that ******** prior to authentication and take over the target. It has been assigned the designation CVE-2024-3094, and This is the hidden content, please Sign In or Sign Up , a This is the hidden content, please Sign In or Sign Up developer who was led to the code after he spotted failing SSH logins using high central processing unit loads. The ********* itself appears to have been introduced to the project in February, but was found by Freund before it was fully deployed in the wild – although some Linux distros, including Red Hat Fedora Linux 40 and Fedora Rawhide, may have received the tainted code already. Other mainstream distros, including This is the hidden content, please Sign In or Sign Up , This is the hidden content, please Sign In or Sign Up and This is the hidden content, please Sign In or Sign Up , have issued their own advisories on the matter. Deeply committed effort The ********* seems to have been the work of an individual going by the handle JiaT75 who, This is the hidden content, please Sign In or Sign Up , had made extensive contributions to the XZ Utils project over a number of years. At face value, the evidence suggests a coordinated and deeply committed effort by JiaT75 to pull the wool over everyone’s eyes. However, little is yet known about this person, and it’s important to note the possibility they may not be the guilty party; they may have been compromised themselves. Saumitra Das, This is the hidden content, please Sign In or Sign Up vice-president of technology, said the XZ Utils incident had echoes of the infamous This is the hidden content, please Sign In or Sign Up , with code silently injected to allow remote unauthenticated access. “It is unclear what the full ******* ***** chain would be once the ******* played out, but such attacks are generally very hard to detect at an early stage,” he said. “These types of incidents further highlight the need for defence in depth to provide for detections at different stages of the ***** chain.” Das additionally noted that This is the hidden content, please Sign In or Sign Up – generally touted as a means to bolster the integrity of new code – provided insufficient safeguards against the supposed exploit scenario, and nor would it have done any good to observe system behaviour on the network or the endpoint for malicious binaries. Command and control (C2) or other anomalous activities would be needed to have any chance of detecting it, he claimed. “This … highlights the need for understanding our software supply chain better,” said Das. “ This is the hidden content, please Sign In or Sign Up is just the first step telling us about software ingredients. The next step would be to verify the source of those ingredients themselves. The GitHub committer who put this in, how that open source component is maintained and by whom, are all relevant questions we will need to take into account.” Developers and users are advised to downgrade XZ Utils to an uncompromised version immediately, before undertaking a thorough hunt for any malicious activity. This is the hidden content, please Sign In or Sign Up #Open #source #alert #intentionally #********* This is the hidden content, please Sign In or Sign Up Link to comment https://hopzone.eu/forums/topic/9803-open-source-alert-over-intentionally-placed-backdoor/ Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now