7.1 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
3.6 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:P/A:N
0.0004 Low
EPSS
Percentile
9.0%
A flaw was discovered in ibus in versions before 1.5.22 that allows any
unprivileged user to monitor and send method calls to the ibus bus of
another user due to a misconfiguration in the DBus server setup. A local
attacker may use this flaw to intercept all keystrokes of a victim user who
is using the graphical interface, change the input method engine, or modify
other input related configurations of the victim user.
Author | Note |
---|---|
alexmurray | The ibus D-Bus socket address contains a long random guid making discovery of this address by another user unlikely. |
mdeslaur | this was reverted in 4134-2 because of a regression, see LP bug |
launchpad.net/bugs/cve/CVE-2019-14822
nvd.nist.gov/vuln/detail/CVE-2019-14822
security-tracker.debian.org/tracker/CVE-2019-14822
ubuntu.com/security/notices/USN-4134-1
ubuntu.com/security/notices/USN-4134-2
ubuntu.com/security/notices/USN-4134-3
www.cve.org/CVERecord?id=CVE-2019-14822
www.openwall.com/lists/oss-security/2019/09/13/1
7.1 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
3.6 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:P/A:N
0.0004 Low
EPSS
Percentile
9.0%