#VU21199 Permissions, Privileges, and Access Controls in IBus


Published: 2019-09-19 | Updated: 2020-02-25

Vulnerability identifier: #VU21199

Vulnerability risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-14822

CWE-ID: CWE-264

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
IBus
Universal components / Libraries / Libraries used by multiple products

Vendor: IBus Project

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to iBus does not check user privileges when allowing connection to the AF_UNIX socket. A local user can connect to an existing AF_UNIX socket and perform arbitrary actions, such read and send messages on behalf of another user connected on a graphical environment. 

Mitigation
Install update from vendor's website.

Vulnerable software versions

IBus: 1.5.2 - 1.5.21


External links
http://www.openwall.com/lists/oss-security/2019/09/13/1
http://github.com/ibus/ibus/commit/3d442dbf936d197aa11ca0a71663c2bc61696151


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability