CVE Vulnerabilities

CVE-2023-30630

Published: Apr 13, 2023 | Modified: Mar 04, 2025
CVSS 3.x
7.1
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
7.1 MODERATE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
Ubuntu
LOW

Dmidecode before 3.5 allows -dump-bin to overwrite a local file. This has security relevance because, for example, execution of Dmidecode via Sudo is plausible. NOTE: Some third parties have indicated the fix in 3.5 does not adequately address the vulnerability. The argument is that the proposed patch prevents dmidecode from writing to an existing file. However, there are multiple attack vectors that would not require overwriting an existing file that would provide the same level of unauthorized privilege escalation (e.g. creating a new file in /etc/cron.hourly).

Affected Software

Name Vendor Start Version End Version
Dmidecode Nongnu * 3.5 (excluding)
Red Hat Enterprise Linux 8 RedHat dmidecode-1:3.3-4.el8_8.1 *
Red Hat Enterprise Linux 9 RedHat dmidecode-1:3.3-7.el9_2.1 *
Cpu-x Ubuntu kinetic *
Cpu-x Ubuntu lunar *
Cpu-x Ubuntu mantic *
Cpu-x Ubuntu trusty *
Cpu-x Ubuntu xenial *
Dmidecode Ubuntu bionic *
Dmidecode Ubuntu esm-infra/bionic *
Dmidecode Ubuntu focal *
Dmidecode Ubuntu jammy *
Dmidecode Ubuntu kinetic *
Dmidecode Ubuntu lunar *
Dmidecode Ubuntu mantic *
Dmidecode Ubuntu trusty *
Dmidecode Ubuntu trusty/esm *
Dmidecode Ubuntu upstream *
Dmidecode Ubuntu xenial *

References