CVE-2016-15045
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-23

Last updated on: 2025-07-25

Assigner: VulnCheck

Description
A local privilege escalation vulnerability exists in lastore-daemon, the system package manager daemon used in Deepin Linux (developed by Wuhan Deepin Technology Co., Ltd.). In versions 0.9.53-1 (Deepin 15.5) and 0.9.66-1 (Deepin 15.7), the D-Bus configuration permits any user in the sudo group to invoke the InstallPackage method without password authentication. By default, the first user created on Deepin is in the sudo group. An attacker with shell access can craft a .deb package containing a malicious post-install script and use dbus-send to install it via lastore-daemon, resulting in arbitrary code execution as root.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-23
Last Modified
2025-07-25
Generated
2026-05-06
AI Q&A
2025-07-23
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
wuhan_deepin_technology_co_ltd lastore-daemon 0.9.53-1
wuhan_deepin_technology_co_ltd lastore-daemon 0.9.66-1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-269 The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
CWE-306 The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a local privilege escalation in the lastore-daemon, the system package manager daemon used in Deepin Linux. It occurs because the D-Bus configuration allows any user in the sudo group to invoke the InstallPackage method without requiring password authentication. Since the first user created on Deepin is by default in the sudo group, an attacker with shell access can create a malicious .deb package with a harmful post-install script and use dbus-send to install it via lastore-daemon, leading to arbitrary code execution with root privileges.


How can this vulnerability impact me? :

This vulnerability can allow an attacker who already has shell access to escalate their privileges to root by installing a malicious package without needing to authenticate. This means the attacker can execute arbitrary code with full system privileges, potentially compromising the entire system, accessing sensitive data, modifying system configurations, or installing persistent malware.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, you should restrict or review sudo group membership to limit users who can invoke the InstallPackage method without password authentication. Avoid allowing untrusted users shell access. Additionally, monitor for and prevent installation of untrusted .deb packages via dbus-send and lastore-daemon. Applying any available patches or updates from Deepin Linux for lastore-daemon is also recommended.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart