CVE-2019-14822
Advisory lineage Upstream: 0 Downstream: 14
Modified
Published: 25 Nov 2019, 11:01
Last modified:05 Aug 2024, 00:26
Vulnerability Summary
Overall Risk (default)
medium
28/100 CVSS Score
7.1 HIGH
v3.1 (nvd)
EPSS Score
0.17% LOW
0% probability 0.00%
KEV
Not listed
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected
Timeline
25 Nov 2019, 11:01
Published
Vulnerability first disclosed
05 Aug 2024, 00:26
Last Modified
Vulnerability information updated
Description
A flaw was discovered in ibus in versions before 1.5.22 that allows any unprivileged user to monitor and send method calls to the ibus bus of another user due to a misconfiguration in the DBus server setup. A local attacker may use this flaw to intercept all keystrokes of a victim user who is using the graphical interface, change the input method engine, or modify other input related configurations of the victim user.
CVSS Metrics
- v3.1•HIGH•Score: 7.1CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
- v2.0•LOW•Score: 3.6AV:L/AC:L/Au:N/C:P/I:P/A:N
EPSS Trends
Current EPSS score: 0.17%• Percentile: 38%
Techniques & Countermeasures
- CWE-862•Missing Authorization
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Affected Systems
- canonical•ubuntu_linux
16.04 | 18.04 | 19.10
- ibus_project•ibus
< 1.5.22
- oracle•zfs_storage_appliance_kit
8.8
- redhat•enterprise_linux
7.0 | 8.0