First published: Thu Jun 06 2019(Updated: )
A flaw was discovered in ibus in versions before 1.5.22 that allows any unprivileged user to monitor and send method calls to the ibus bus of another user due to a misconfiguration in the DBus server setup. A local attacker may use this flaw to intercept all keystrokes of a victim user who is using the graphical interface, change the input method engine, or modify other input related configurations of the victim user.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ibus Project Ibus | <1.5.22 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.10 | |
Oracle ZFS Storage Appliance Kit | =8.8 | |
redhat/ibus | <1.5.22 | 1.5.22 |
IBM Security Guardium | <=10.5 | |
IBM Security Guardium | <=10.6 | |
IBM Security Guardium | <=11.0 | |
IBM Security Guardium | <=11.1 | |
IBM Security Guardium | <=11.2 | |
IBM Security Guardium | <=11.3 | |
debian/ibus | 1.5.23-2 1.5.27-5 1.5.30-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-14822 is a vulnerability in the ibus package that allows unprivileged users to monitor and intercept keystrokes of another user due to a misconfiguration in the DBus server setup.
CVE-2019-14822 has a severity score of 7.1, which is considered high.
The affected software versions include ibus before 1.5.22, 1.5.17-3ubuntu5.3, 1.5.21-1~, 1.5.11-1ubuntu2.4, 1.5.19-4+deb10u1, 1.5.23-2, 1.5.27-5, and 1.5.29~rc1-1.
To fix CVE-2019-14822, upgrade to ibus version 1.5.22 or apply the specific remedy provided by your operating system.
You can find more information about CVE-2019-14822 in the references: [1] [2].