CVE Vulnerabilities

CVE-2023-30630

Published: Apr 13, 2023 | Modified: Mar 04, 2025
CVSS 3.x
7.1
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
7.1 MODERATE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

Dmidecode before 3.5 allows -dump-bin to overwrite a local file. This has security relevance because, for example, execution of Dmidecode via Sudo is plausible. NOTE: Some third parties have indicated the fix in 3.5 does not adequately address the vulnerability. The argument is that the proposed patch prevents dmidecode from writing to an existing file. However, there are multiple attack vectors that would not require overwriting an existing file that would provide the same level of unauthorized privilege escalation (e.g. creating a new file in /etc/cron.hourly).

Affected Software

NameVendorStart VersionEnd Version
DmidecodeNongnu*3.5 (excluding)
Red Hat Enterprise Linux 8RedHatdmidecode-1:3.3-4.el8_8.1*
Red Hat Enterprise Linux 9RedHatdmidecode-1:3.3-7.el9_2.1*
Cpu-xUbuntufocal*
Cpu-xUbuntukinetic*
Cpu-xUbuntulunar*
Cpu-xUbuntumantic*
Cpu-xUbuntuoracular*
Cpu-xUbuntuplucky*
Cpu-xUbuntutrusty*
Cpu-xUbuntuxenial*
DmidecodeUbuntubionic*
DmidecodeUbuntuesm-infra/bionic*
DmidecodeUbuntuesm-infra/focal*
DmidecodeUbuntufocal*
DmidecodeUbuntujammy*
DmidecodeUbuntukinetic*
DmidecodeUbuntulunar*
DmidecodeUbuntumantic*
DmidecodeUbuntutrusty*
DmidecodeUbuntutrusty/esm*
DmidecodeUbuntuupstream*
DmidecodeUbuntuxenial*

References