An issue was discovered in the Interpeak IPCOMShell TELNET server on Green Hills INTEGRITY RTOS 5.0.4. There is a heap-based buffer overflow in the function responsible for printing the shell prompt, when a custom modifier is used to display information such as a process ID, IP address, or current working directory. Modifier expansion triggers this overflow, causing memory corruption or a crash (and also leaks memory address information).
References
Link Resource
https://github.com/bl4ckic3/GHS-Bugs Exploit Third Party Advisory
https://www.ghs.com/products/rtos/integrity.html Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2019-03-26T01:00:49

Updated: 2019-03-26T01:00:49

Reserved: 2019-02-10T00:00:00


Link: CVE-2019-7713

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2019-03-26T01:29:00.883

Modified: 2020-08-24T17:37:01.140


Link: CVE-2019-7713

JSON object: View

cve-icon Redhat Information

No data.

CWE