An issue was discovered in the Interpeak IPCOMShell TELNET server on Green Hills INTEGRITY RTOS 5.0.4. There is a heap-based buffer overflow in the function responsible for printing the shell prompt, when a custom modifier is used to display information such as a process ID, IP address, or current working directory. Modifier expansion triggers this overflow, causing memory corruption or a crash (and also leaks memory address information).
References
Link | Resource |
---|---|
https://github.com/bl4ckic3/GHS-Bugs | Exploit Third Party Advisory |
https://www.ghs.com/products/rtos/integrity.html | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-03-26T01:00:49
Updated: 2019-03-26T01:00:49
Reserved: 2019-02-10T00:00:00
Link: CVE-2019-7713
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-03-26T01:29:00.883
Modified: 2020-08-24T17:37:01.140
Link: CVE-2019-7713
JSON object: View
Redhat Information
No data.
CWE