In mprivacy-tools before 2.0.406g in m-privacy TightGate...
High severity
Unreviewed
Published
Nov 22, 2023
to the GitHub Advisory Database
•
Updated Dec 9, 2023
Description
Published by the National Vulnerability Database
Nov 22, 2023
Published to the GitHub Advisory Database
Nov 22, 2023
Last updated
Dec 9, 2023
In mprivacy-tools before 2.0.406g in m-privacy TightGate-Pro Server, broken Access Control on X11 server sockets allows authenticated attackers (with access to a VNC session) to access the X11 desktops of other users by specifying their DISPLAY ID. This allows complete control of their desktop, including the ability to inject keystrokes and perform a keylogging attack.
References