First published: Fri Nov 14 2014(Updated: )
signond before 8.57+15.04.20141127.1-0ubuntu1, as used in Ubuntu Touch, did not properly restrict applications from querying oath tokens due to incorrect checks and the missing installation of the signon-apparmor-extension. An attacker could use this create a malicious click app that collects oauth tokens for other applications, exposing sensitive information.
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
signond | <8.57\+15.04.20141127.1-0ubuntu1 | |
Ubuntu Touch |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1423 has a medium severity rating due to its potential to allow an attacker to access sensitive oath tokens.
To fix CVE-2014-1423, upgrade signond to version 8.57+15.04.20141127.1-0ubuntu1 or later.
CVE-2014-1423 affects applications that rely on signond in Ubuntu Touch versions before 8.57+15.04.20141127.1-0ubuntu1.
CVE-2014-1423 could potentially be exploited remotely through malicious click apps.
A workaround for CVE-2014-1423 involves applying proper checks and ensuring the installation of the signon-apparmor-extension.