Vulnerability Description
An issue was discovered in the Interpeak IPCOMShell TELNET server on Green Hills INTEGRITY RTOS 5.0.4. There is a heap-based buffer overflow in the function responsible for printing the shell prompt, when a custom modifier is used to display information such as a process ID, IP address, or current working directory. Modifier expansion triggers this overflow, causing memory corruption or a crash (and also leaks memory address information).
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ghs | Integrity Rtos | 5.0.4 |
Related Weaknesses (CWE)
References
- https://github.com/bl4ckic3/GHS-BugsExploitThird Party Advisory
- https://www.ghs.com/products/rtos/integrity.htmlVendor Advisory
- https://github.com/bl4ckic3/GHS-BugsExploitThird Party Advisory
- https://www.ghs.com/products/rtos/integrity.htmlVendor Advisory
FAQ
What is CVE-2019-7713?
CVE-2019-7713 is a vulnerability with a CVSS score of 9.8 (CRITICAL). An issue was discovered in the Interpeak IPCOMShell TELNET server on Green Hills INTEGRITY RTOS 5.0.4. There is a heap-based buffer overflow in the function responsible for printing the shell prompt, ...
How severe is CVE-2019-7713?
CVE-2019-7713 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-7713?
Check the references section above for vendor advisories and patch information. Affected products include: Ghs Integrity Rtos.