signond before 8.57+15.04.20141127.1-0ubuntu1, as used in Ubuntu Touch, did not properly restrict applications from querying oath tokens due to incorrect checks and the missing installation of the signon-apparmor-extension. An attacker could use this create a malicious click app that collects oauth tokens for other applications, exposing sensitive information.
References
Link | Resource |
---|---|
http://bazaar.launchpad.net/~online-accounts/signon/upstream/revision/644 | Third Party Advisory |
http://bazaar.launchpad.net/~online-accounts/signon/upstream/revision/645 | Third Party Advisory |
https://bugs.launchpad.net/ubuntu/+source/signon/+bug/1392380 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: canonical
Published: 2014-11-14T00:00:00
Updated: 2020-05-07T22:25:16
Reserved: 2014-01-13T00:00:00
Link: CVE-2014-1423
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-05-07T23:15:11.310
Modified: 2020-05-12T20:15:08.583
Link: CVE-2014-1423
JSON object: View
Redhat Information
No data.
CWE