bolo boosted

Though they apparently include a tool to calculate offsets.
So yeah, this works on a fully-patched Ubuntu 22.04 system.

bolo boosted

An exploitation of the xz backdoor. Including notes, honeypot, and exploit demo.

github.com/amlweems/xzbot

#xz #xzbackdoor #InfoSec

bolo boosted
bolo boosted
My heart goes out to xz. A single maintainer, who was clearly in a rough place with mental health, screaming out to the world for some help and additional contributions, and somebody shows up wanting to help. Could you imagine how happy that maintainer was? They were no longer alone.

And it turns out the only reason somebody wanted to help them was nefarious. I can’t imagine how they feel right now as everyone is blaming them. I hope they’re ok.
bolo boosted
bolo boosted

@0xabad1dea that's a warning to malware state actors - do not get between a db guy and performance. They will fuck you up.

bolo boosted
bolo boosted

I'm watching some folks reverse engineer the xz backdoor, sharing some *preliminary* analysis with permission.

The hooked RSA_public_decrypt verifies a signature on the server's host key by a fixed Ed448 key, and then passes a payload to system().

It's RCE, not auth bypass, and gated/unreplayable.

More details in this thread: bsky.app/profile/did:plc:x2nsu

bolo boosted

Well this is fucking lovely....

Malicious code was discovered in the upstream tarballs of "xz" which then affects liblzma

Downstream there may be backdoors in various implementations of "sshd".

Versions Affected:

Fedora 41
Fedora Rawhide
openSUSE Tumbleweed
Debian testing, unstable, experimental distributions
Kali updates between March 26th and March 29th

Original notice here:
openwall.com/lists/oss-securit

Red Hat CVE: nvd.nist.gov/vuln/detail/CVE-2

Red Hat Security Blog Post: redhat.com/en/blog/urgent-secu

Arch Linux Security Post: archlinux.org/news/the-xz-pack

Debian Security Post: lists.debian.org/debian-securi

openSUSE Security Post: news.opensuse.org/2024/03/29/x

Kali Linux announcement: infosec.exchange/@kalilinux/11

CISA Advisory: cisa.gov/news-events/alerts/20

Article here: helpnetsecurity.com/2024/03/29

#infosec #linux #foss #hacking #cve20243094 #cve

bolo boosted

I was doing some micro-benchmarking at the time, needed to quiesce the system to reduce noise. Saw sshd processes were using a surprising amount of CPU, despite immediately failing because of wrong usernames etc. Profiled sshd, showing lots of cpu time in liblzma, with perf unable to attribute it to a symbol. Got suspicious. Recalled that I had seen an odd valgrind complaint in automated testing of postgres, a few weeks earlier, after package updates.

Really required a lot of coincidences.

Show thread
bolo boosted

Researchers have found a malicious backdoor in a compression tool that made its way into widely used Linux distributions, including those from Red Hat and Debian.

The compression utility, known as xz Utils, introduced the malicious code in versions ​​5.6.0 and 5.6.1, according to Andres Freund, the developer who discovered it.

The first signs of the backdoor were introduced in a February 23 update that added obfuscated code, officials from Red Hat said in an email. An update the following day included a malicious install script that injected itself into functions used by sshd, the binary file that makes SSH work. The malicious code has resided only in the archived releases—known as tarballs—which are released upstream. So-called GIT code available in repositories aren’t affected, although they do contain second-stage artifacts allowing the injection during the build time. In the event the obfuscated code introduced on February 23 is present, the artifacts in the GIT version allow the backdoor to operate.

The malicious changes were submitted by JiaT75, one of the two main xz Utils developers with years of contributions to the project.

“Given the activity over several weeks, the committer is either directly involved or there was some quite severe compromise of their system,” an official with distributor OpenWall wrote in an advisory. “Unfortunately the latter looks like the less likely explanation, given they communicated on various lists about the ‘fixes’” provided in recent updates.

arstechnica.com/security/2024/

bolo boosted

A reminder that many many of our Jewish friends don't agree with the #gaza_genocide
#IsraelGazawar

bolo boosted

Mappa dei cavi sottomarini 2023
Questa nuova edizione illustra 529 sistemi di cavi e 1.444 approdi attualmente attivi o in costruzione.

submarine-cable-map-2023.teleg

bolo boosted

La vera grandezza di un'azienda di successo si vede nella sua capacità di fare pace con i concorrenti, quindi a Natale ricordatevi di fare gli auguri non solo a Gesù, ma anche a Isaac Newton (1643-1727), lo scienziato nato il 25 dicembre, che anche senza droghe era geniale e iperproduttivo come se fosse sotto anfetamine, e scontroso e paranoico come se fosse in crisi d'astinenza.

bolo boosted
bolo boosted
bolo boosted
bolo boosted

Elon Musk bashed the German government for providing some help to migrants lost at sea (and promoted a far-right political party with Nazi roots) the same day that the UN revealed that more than 2,500 people have already drowned this year in the Mediterranean. businessinsider.com/elon-musk-

bolo boosted
bolo boosted

A PoC for the Ivanti (MobileIron) RCE (CVE-2023-35078) has been uploaded on GitHub: github.com/vchan-in/CVE-2023-3

Can anyone confirm this is legit?

Show older
Mastodon Bida.im

Un'istanza mastodon antifascista prevalentemente italofona con base a Bologna - Manifesto - Cosa non si può fare qui

An antifa mostly-italian speaking mastodon istance based in Bologna - About us - What you can't do here

Tech stuff provided by Collettivo Bida