CVE-2019-14822 – ibus: missing authorization allows local attacker to access the input bus of another user
https://notcve.org/view.php?id=CVE-2019-14822
A flaw was discovered in ibus in versions before 1.5.22 that allows any unprivileged user to monitor and send method calls to the ibus bus of another user due to a misconfiguration in the DBus server setup. A local attacker may use this flaw to intercept all keystrokes of a victim user who is using the graphical interface, change the input method engine, or modify other input related configurations of the victim user. Se detecto un fallo en el ibus en las versiones anteriores a la 1.5.22 que permite a cualquier usuario sin privilegios supervisar y enviar llamadas de método al bus ibus de otro usuario debido a una configuración errónea en la configuración del servidor DBus. Un atacante local puede utilizar este fallo para interceptar todas las pulsaciones de teclas de un usuario víctima que esté utilizando la interfaz gráfica, cambiar el motor del método de entrada o modificar otras configuraciones relacionadas con la entrada del usuario víctima A flaw was discovered in ibus that allows any unprivileged user to monitor and send method calls to the ibus bus of another user due to a misconfiguration in the DBus server setup. A local attacker may use this flaw to intercept all keystrokes of a victim user who is using the graphical interface, change the input method engine, or modify other input related configurations of the victim user. • https://bugzilla.redhat.com/show_bug.cgi?id=1717958 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14822 https://usn.ubuntu.com/4134-3 https://www.oracle.com/security-alerts/cpuapr2022.html https://access.redhat.com/security/cve/CVE-2019-14822 • CWE-862: Missing Authorization •
CVE-2013-4509
https://notcve.org/view.php?id=CVE-2013-4509
The default configuration of IBUS 1.5.4, and possibly 1.5.2 and earlier, when IBus.InputPurpose.PASSWORD is not set and used with GNOME 3, does not obscure the entered password characters, which allows physically proximate attackers to obtain a user password by reading the lockscreen. La configuración predeterminada de IBUS 1.5.4, y posiblemente de 1.5.2 y anteriores, cuando IBus.InputPurpose.PASSWORD no se establece y utiliza con GNOME 3, no oscurece los caracteres escritos, lo que permite a atacantes físicamente próximos obtener una contraseña de usuario mediante la lectura de la pantalla de bloqueo. • http://lists.opensuse.org/opensuse-updates/2013-11/msg00036.html http://lists.opensuse.org/opensuse-updates/2013-12/msg00024.html http://lists.opensuse.org/opensuse-updates/2014-01/msg00045.html https://bugzilla.redhat.com/show_bug.cgi?id=1027028 https://code.google.com/p/mozc/issues/attachmentText?id=199&aid=1990002000&name=ibus-mozc_support_ibus-1.5.4_rev2.diff&token=P62umpXGXx68XJT6zyvBA727wqE%3A1383693105690 https://github.com/ibus/ibus-anthy/commit/6aae0a9f145f536515e268dd6b25aa740a5edfe7 https://groups.go • CWE-255: Credentials Management Errors •