An issue was discovered in the Interpeak IPCOMShell TELNET server on Green Hills INTEGRITY RTOS 5.0.4. The main shell handler function uses the value of the environment variable ipcom.shell.greeting as the first argument to printf(). Setting this variable using the sysvar command results in a user-controlled format string during login, resulting in an information leak of memory addresses.
References
Link | Resource |
---|---|
https://github.com/bl4ckic3/GHS-Bugs | Third Party Advisory |
https://www.ghs.com/products/rtos/integrity.html | Vendor Advisory |
https://github.com/bl4ckic3/GHS-Bugs | Third Party Advisory |
https://www.ghs.com/products/rtos/integrity.html | Vendor Advisory |
Configurations
History
21 Nov 2024, 04:48
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/bl4ckic3/GHS-Bugs - Third Party Advisory | |
References | () https://www.ghs.com/products/rtos/integrity.html - Vendor Advisory |
Information
Published : 2019-03-26 02:29
Updated : 2024-11-21 04:48
NVD link : CVE-2019-7715
Mitre link : CVE-2019-7715
CVE.ORG link : CVE-2019-7715
JSON object : View
Products Affected
ghs
- integrity_rtos
CWE
CWE-134
Use of Externally-Controlled Format String