Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-30630

Опубликовано: 13 апр. 2023
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS3: 7.1

Описание

Dmidecode before 3.5 allows -dump-bin to overwrite a local file. This has security relevance because, for example, execution of Dmidecode via Sudo is plausible.

РелизСтатусПримечание
bionic

DNE

devel

needs-triage

esm-apps/focal

needs-triage

esm-apps/jammy

needs-triage

esm-apps/noble

needs-triage

focal

ignored

end of standard support, was needs-triage
jammy

needs-triage

kinetic

ignored

end of life, was needs-triage
lunar

ignored

end of life, was needs-triage
mantic

ignored

end of life, was needs-triage

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
devel

not-affected

3.5-3build1
esm-infra-legacy/trusty

needs-triage

esm-infra/bionic

needed

esm-infra/focal

needed

esm-infra/xenial

needs-triage

focal

ignored

end of standard support, was needed
jammy

needed

kinetic

ignored

end of life, was needed
lunar

ignored

end of life, was needed

Показывать по

EPSS

Процентиль: 5%
0.00025
Низкий

7.1 High

CVSS3

Связанные уязвимости

CVSS3: 7.1
redhat
около 2 лет назад

Dmidecode before 3.5 allows -dump-bin to overwrite a local file. This has security relevance because, for example, execution of Dmidecode via Sudo is plausible. NOTE: Some third parties have indicated the fix in 3.5 does not adequately address the vulnerability. The argument is that the proposed patch prevents dmidecode from writing to an existing file. However, there are multiple attack vectors that would not require overwriting an existing file that would provide the same level of unauthorized privilege escalation (e.g. creating a new file in /etc/cron.hourly).

CVSS3: 7.1
nvd
около 2 лет назад

Dmidecode before 3.5 allows -dump-bin to overwrite a local file. This has security relevance because, for example, execution of Dmidecode via Sudo is plausible. NOTE: Some third parties have indicated the fix in 3.5 does not adequately address the vulnerability. The argument is that the proposed patch prevents dmidecode from writing to an existing file. However, there are multiple attack vectors that would not require overwriting an existing file that would provide the same level of unauthorized privilege escalation (e.g. creating a new file in /etc/cron.hourly).

CVSS3: 7.1
msrc
около 2 лет назад

Описание отсутствует

CVSS3: 7.1
debian
около 2 лет назад

Dmidecode before 3.5 allows -dump-bin to overwrite a local file. This ...

suse-cvrf
около 2 лет назад

Security update for dmidecode

EPSS

Процентиль: 5%
0.00025
Низкий

7.1 High

CVSS3