Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-30630
HistoryApr 13, 2023 - 12:00 a.m.

CVE-2023-30630

2023-04-1300:00:00
ubuntu.com
ubuntu.com
12
dmidecode
file overwrite
security relevance
sudo execution
non-default configuration
elevated privileges
upstream commits

7.1 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

0.0004 Low

EPSS

Percentile

10.0%

Dmidecode before 3.5 allows -dump-bin to overwrite a local file. This has
security relevance because, for example, execution of Dmidecode via Sudo is
plausible.

Notes

Author Note
rodrigo-zaiden cpu-x embedds dmidecode source
mdeslaur This CVE relies on an improbable non-default configuration of allowing an unprivileged user to run demidecode under sudo with a specific insecure configuration in the sudoers file. Using dmidecode in such a manner is no different than allowing any other tool to unexpectedly run with elevated privileges. Setting priority to low. The upstream commits listed below only prevent overwriting a file as root, but still allows creating arbitrary files as root so using dmidecode with elevated privileges via sudoers is still unsafe.

7.1 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

0.0004 Low

EPSS

Percentile

10.0%