CVE-2001-1339

Beck IPC GmbH IPC@CHIP telnet service does not delay or disconnect users from the service when bad passwords are entered, which makes it easier for remote attackers to conduct brute force password guessing attacks.
References
Link Resource
http://cert.uni-stuttgart.de/archive/bugtraq/2001/06/msg00010.html Broken Link
http://www.iss.net/security_center/static/6605.php Broken Link Vendor Advisory
http://www.kb.cert.org/vuls/id/198979 Third Party Advisory US Government Resource
http://www.securityfocus.com/archive/1/186418 Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/2771 Broken Link Exploit Patch Third Party Advisory VDB Entry Vendor Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:anybus:ipc\@chip_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:anybus:ipc\@chip:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2001-05-24 04:00

Updated : 2024-02-09 03:15


NVD link : CVE-2001-1339

Mitre link : CVE-2001-1339

CVE.ORG link : CVE-2001-1339


JSON object : View

Products Affected

anybus

  • ipc\@chip
  • ipc\@chip_firmware
CWE
CWE-307

Improper Restriction of Excessive Authentication Attempts