First published: Mon Apr 10 2017(Updated: )
dde-daemon, the daemon process of DDE (Deepin Desktop Environment) 15.0 through 15.3, runs with root privileges and hardly does anything to identify the user who calls the function through D-Bus. Anybody can change the grub config, even to append some arguments to make a backdoor or privilege escalation, by calling DoWriteGrubSettings() provided by dde-daemon.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Deepin Desktop Environment | =15.0 | |
Deepin Desktop Environment | =15.1 | |
Deepin Desktop Environment | =15.2 | |
Deepin Desktop Environment | =15.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7622 is considered a high severity vulnerability due to its potential for privilege escalation.
To fix CVE-2017-7622, update the Deepin Desktop Environment to a version higher than 15.3 where the vulnerability is patched.
The impact of CVE-2017-7622 allows unauthorized users to modify grub configuration, potentially leading to a system compromise.
CVE-2017-7622 affects Deepin Desktop Environment versions 15.0 through 15.3.
CVE-2017-7622 is not remotely exploitable as it requires local access to the system to leverage the vulnerability.