CVE-2001-1339

Current Description

Beck IPC GmbH IPC@CHIP telnet service does not delay or disconnect users from the service when bad passwords are entered, which makes it easier for remote attackers to conduct brute force password guessing attacks.

Basic Data

PublishedMay 24, 2001
Last ModifiedSeptember 05, 2008
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score7.5
SeverityHIGH
Exploitability Score10.0
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegetrue
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationBeck Ipc GmbhIpc At Chip Embedded-webserver********

Vulnerable Software List

VendorProductVersions
Beck Ipc Gmbh Ipc At Chip Embedded-webserver *

References

NameSourceURLTags
20010602 IPC@Chip - Fixeshttp://cert.uni-stuttgart.de/archive/bugtraq/2001/06/msg00010.htmlBUGTRAQ
ipcchip-telnet-bruteforce-passwords(6605)http://www.iss.net/security_center/static/6605.phpXFVendor Advisory
VU#198979http://www.kb.cert.org/vuls/id/198979CERT-VNUS Government Resource
20010524 IPC@Chip Securityhttp://www.securityfocus.com/archive/1/186418BUGTRAQ
2771http://www.securityfocus.com/bid/2771BIDExploit Patch Vendor Advisory