A flaw was discovered in ibus in versions before 1.5.22 that allows any unprivileged user to monitor and send method calls to the ibus bus of another user due to a misconfiguration in the DBus server setup. A local attacker may use this flaw to intercept all keystrokes of a victim user who is using the graphical interface, change the input method engine, or modify other input related configurations of the victim user.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14822 | Issue Tracking Patch Third Party Advisory |
https://usn.ubuntu.com/4134-3/ | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1717958 | Issue Tracking Third Party Advisory |
https://www.oracle.com/security-alerts/cpuapr2022.html | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Information
Published : 2019-11-25 04:15
Updated : 2022-06-07 11:41
NVD link : CVE-2019-14822
Mitre link : CVE-2019-14822
JSON object : View
CWE
CWE-862
Missing Authorization
Products Affected
canonical
- ubuntu_linux
oracle
- zfs_storage_appliance_kit
ibus_project
- ibus
redhat
- enterprise_linux