Vulnerability Description
An issue was discovered in handler_ipcom_shell_pwd in the Interpeak IPCOMShell TELNET server on Green Hills INTEGRITY RTOS 5.0.4. When using the pwd command, the current working directory path is used as the first argument to printf() without a proper check. An attacker may thus forge a path containing format string modifiers to get a custom format string evaluated. This results in an information leak of memory addresses.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ghs | Integrity Rtos | 5.0.4 |
Related Weaknesses (CWE)
References
- https://github.com/bl4ckic3/GHS-BugsThird Party Advisory
- https://www.ghs.com/products/rtos/integrity.htmlVendor Advisory
- https://github.com/bl4ckic3/GHS-BugsThird Party Advisory
- https://www.ghs.com/products/rtos/integrity.htmlVendor Advisory
FAQ
What is CVE-2019-7712?
CVE-2019-7712 is a vulnerability with a CVSS score of 7.5 (HIGH). An issue was discovered in handler_ipcom_shell_pwd in the Interpeak IPCOMShell TELNET server on Green Hills INTEGRITY RTOS 5.0.4. When using the pwd command, the current working directory path is used...
How severe is CVE-2019-7712?
CVE-2019-7712 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-7712?
Check the references section above for vendor advisories and patch information. Affected products include: Ghs Integrity Rtos.