logiops through 0.3.4, in its default configuration, allows any unprivileged user to configure its logid daemon via an unrestricted D-Bus service, including setting malicious keyboard macros. This allows for privilege escalation with minimal user interaction.
Metrics
Affected Vendors & Products
References
History
Thu, 19 Sep 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Logiops
Logiops logiops |
|
Weaknesses | CWE-269 | |
CPEs | cpe:2.3:a:logiops:logiops:*:*:*:*:*:*:*:* | |
Vendors & Products |
Logiops
Logiops logiops |
|
Metrics |
ssvc
|
Thu, 19 Sep 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | logiops through 0.3.4, in its default configuration, allows any unprivileged user to configure its logid daemon via an unrestricted D-Bus service, including setting malicious keyboard macros. This allows for privilege escalation with minimal user interaction. | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-09-19T00:00:00
Updated: 2024-09-19T16:10:46.692Z
Reserved: 2024-09-06T00:00:00
Link: CVE-2024-45752
Vulnrichment
Updated: 2024-09-19T16:08:27.395Z
NVD
Status : Received
Published: 2024-09-19T16:15:04.910
Modified: 2024-09-19T16:35:06.277
Link: CVE-2024-45752
Redhat
No data.