First published: Tue Aug 13 2024(Updated: )
Incorrect default permissions in the AMD ?Prof installation directory could allow an attacker to achieve privilege escalation, potentially resulting in arbitrary code execution.
Credit: psirt@amd.com
Affected Software | Affected Version | How to fix |
---|---|---|
AMD uprof linux | <4.1.424 | |
AMD uprof freebsd | <4.2.816 | |
AMD uprof windows | <4.2.845 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-31349 has been classified with a high severity level due to the potential for privilege escalation and arbitrary code execution.
CVE-2023-31349 affects AMD uProf versions prior to 4.1.424 on Linux, 4.2.816 on FreeBSD, and 4.2.845 on Windows.
To fix CVE-2023-31349, ensure that the permissions of the AMD μProf installation directory are set correctly and consider updating to the latest version of the software.
If exploited, CVE-2023-31349 can lead to privilege escalation, allowing attackers to execute arbitrary code on the vulnerable system.
Yes, AMD has released updates that address the vulnerabilities identified in CVE-2023-31349.