Beck IPC GmbH IPC@CHIP telnet service does not delay or disconnect users from the service when bad passwords are entered, which makes it easier for remote attackers to conduct brute force password guessing attacks.
References
Link | Resource |
---|---|
http://cert.uni-stuttgart.de/archive/bugtraq/2001/06/msg00010.html | Broken Link |
http://www.iss.net/security_center/static/6605.php | Broken Link Vendor Advisory |
http://www.kb.cert.org/vuls/id/198979 | Third Party Advisory US Government Resource |
http://www.securityfocus.com/archive/1/186418 | Broken Link Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/2771 | Broken Link Exploit Patch Third Party Advisory VDB Entry Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2001-05-24 04:00
Updated : 2024-02-09 03:15
NVD link : CVE-2001-1339
Mitre link : CVE-2001-1339
CVE.ORG link : CVE-2001-1339
JSON object : View
Products Affected
anybus
- ipc\@chip
- ipc\@chip_firmware
CWE
CWE-307
Improper Restriction of Excessive Authentication Attempts