Beck IPC GmbH IPC@CHIP telnet service does not delay or disconnect users from the service when bad passwords are entered, which makes it easier for remote attackers to conduct brute force password guessing attacks.
References
Link | Resource |
---|---|
http://cert.uni-stuttgart.de/archive/bugtraq/2001/06/msg00010.html | Broken Link |
http://www.iss.net/security_center/static/6605.php | Broken Link Vendor Advisory |
http://www.kb.cert.org/vuls/id/198979 | Third Party Advisory US Government Resource |
http://www.securityfocus.com/archive/1/186418 | Broken Link Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/2771 | Broken Link Exploit Patch Third Party Advisory VDB Entry Vendor Advisory |
http://cert.uni-stuttgart.de/archive/bugtraq/2001/06/msg00010.html | Broken Link |
http://www.iss.net/security_center/static/6605.php | Broken Link Vendor Advisory |
http://www.kb.cert.org/vuls/id/198979 | Third Party Advisory US Government Resource |
http://www.securityfocus.com/archive/1/186418 | Broken Link Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/2771 | Broken Link Exploit Patch Third Party Advisory VDB Entry Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
20 Nov 2024, 23:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://cert.uni-stuttgart.de/archive/bugtraq/2001/06/msg00010.html - Broken Link | |
References | () http://www.iss.net/security_center/static/6605.php - Broken Link, Vendor Advisory | |
References | () http://www.kb.cert.org/vuls/id/198979 - Third Party Advisory, US Government Resource | |
References | () http://www.securityfocus.com/archive/1/186418 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/2771 - Broken Link, Exploit, Patch, Third Party Advisory, VDB Entry, Vendor Advisory |
09 Feb 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:anybus:ipc\@chip_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:anybus:ipc\@chip:-:*:*:*:*:*:*:* |
|
References | () http://cert.uni-stuttgart.de/archive/bugtraq/2001/06/msg00010.html - Broken Link | |
References | () http://www.iss.net/security_center/static/6605.php - Broken Link, Vendor Advisory | |
References | () http://www.kb.cert.org/vuls/id/198979 - Third Party Advisory, US Government Resource | |
References | () http://www.securityfocus.com/archive/1/186418 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/2771 - Broken Link, Exploit, Patch, Third Party Advisory, VDB Entry, Vendor Advisory | |
First Time |
Anybus ipc\@chip Firmware
Anybus Anybus ipc\@chip |
|
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 9.8 |
CWE | CWE-307 |
Information
Published : 2001-05-24 04:00
Updated : 2024-11-20 23:37
NVD link : CVE-2001-1339
Mitre link : CVE-2001-1339
CVE.ORG link : CVE-2001-1339
JSON object : View
Products Affected
anybus
- ipc\@chip
- ipc\@chip_firmware
CWE
CWE-307
Improper Restriction of Excessive Authentication Attempts