A flaw was discovered in ibus in versions before 1.5.22 that allows any unprivileged user to monitor and send method calls to the ibus bus of another user due to a misconfiguration in the DBus server setup. A local attacker may use this flaw to intercept all keystrokes of a victim user who is using the graphical interface, change the input method engine, or modify other input related configurations of the victim user.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1717958 | Issue Tracking Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14822 | Issue Tracking Patch Third Party Advisory |
https://usn.ubuntu.com/4134-3/ | Third Party Advisory |
https://www.oracle.com/security-alerts/cpuapr2022.html | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
No history.
Information
Published : 2019-11-25 12:15
Updated : 2024-02-28 17:28
NVD link : CVE-2019-14822
Mitre link : CVE-2019-14822
CVE.ORG link : CVE-2019-14822
JSON object : View
Products Affected
canonical
- ubuntu_linux
oracle
- zfs_storage_appliance_kit
redhat
- enterprise_linux
ibus_project
- ibus
CWE
CWE-862
Missing Authorization