Dmidecode before 3.5 allows -dump-bin to overwrite a local file. This has security relevance because, for example, execution of Dmidecode via Sudo is plausible. NOTE: Some third parties have indicated the fix in 3.5 does not adequately address the vulnerability. The argument is that the proposed patch prevents dmidecode from writing to an existing file. However, there are multiple attack vectors that would not require overwriting an existing file that would provide the same level of unauthorized privilege escalation (e.g. creating a new file in /etc/cron.hourly).
References
Link | Resource |
---|---|
https://git.savannah.nongnu.org/cgit/dmidecode.git/commit/?id=6ca381c1247c81f74e1ca4e7706f70bdda72e6f2 | Not Applicable |
https://git.savannah.nongnu.org/cgit/dmidecode.git/commit/?id=d8cfbc808f387e87091c25e7d5b8c2bb348bb206 | Not Applicable |
https://github.com/adamreiser/dmiwrite | Exploit Third Party Advisory |
https://lists.nongnu.org/archive/html/dmidecode-devel/2023-03/msg00003.html | Mailing List Patch Release Notes Vendor Advisory |
https://git.savannah.nongnu.org/cgit/dmidecode.git/commit/?id=6ca381c1247c81f74e1ca4e7706f70bdda72e6f2 | Not Applicable |
https://git.savannah.nongnu.org/cgit/dmidecode.git/commit/?id=d8cfbc808f387e87091c25e7d5b8c2bb348bb206 | Not Applicable |
https://github.com/adamreiser/dmiwrite | Exploit Third Party Advisory |
https://lists.nongnu.org/archive/html/dmidecode-devel/2023-03/msg00003.html | Mailing List Patch Release Notes Vendor Advisory |
Configurations
History
04 Mar 2025, 22:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) Dmidecode before 3.5 allows -dump-bin to overwrite a local file. This has security relevance because, for example, execution of Dmidecode via Sudo is plausible. NOTE: Some third parties have indicated the fix in 3.5 does not adequately address the vulnerability. The argument is that the proposed patch prevents dmidecode from writing to an existing file. However, there are multiple attack vectors that would not require overwriting an existing file that would provide the same level of unauthorized privilege escalation (e.g. creating a new file in /etc/cron.hourly). |
07 Feb 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-23 |
21 Nov 2024, 08:00
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.savannah.nongnu.org/cgit/dmidecode.git/commit/?id=6ca381c1247c81f74e1ca4e7706f70bdda72e6f2 - Not Applicable | |
References | () https://git.savannah.nongnu.org/cgit/dmidecode.git/commit/?id=d8cfbc808f387e87091c25e7d5b8c2bb348bb206 - Not Applicable | |
References | () https://github.com/adamreiser/dmiwrite - Exploit, Third Party Advisory | |
References | () https://lists.nongnu.org/archive/html/dmidecode-devel/2023-03/msg00003.html - Mailing List, Patch, Release Notes, Vendor Advisory |
21 Apr 2023, 04:18
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-04-13 16:15
Updated : 2025-03-04 22:15
NVD link : CVE-2023-30630
Mitre link : CVE-2023-30630
CVE.ORG link : CVE-2023-30630
JSON object : View
Products Affected
nongnu
- dmidecode
CWE