CVE-2001-1339

Beck IPC GmbH IPC@CHIP telnet service does not delay or disconnect users from the service when bad passwords are entered, which makes it easier for remote attackers to conduct brute force password guessing attacks.
References
Link Resource
http://cert.uni-stuttgart.de/archive/bugtraq/2001/06/msg00010.html Broken Link
http://www.iss.net/security_center/static/6605.php Broken Link Vendor Advisory
http://www.kb.cert.org/vuls/id/198979 Third Party Advisory US Government Resource
http://www.securityfocus.com/archive/1/186418 Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/2771 Broken Link Exploit Patch Third Party Advisory VDB Entry Vendor Advisory
http://cert.uni-stuttgart.de/archive/bugtraq/2001/06/msg00010.html Broken Link
http://www.iss.net/security_center/static/6605.php Broken Link Vendor Advisory
http://www.kb.cert.org/vuls/id/198979 Third Party Advisory US Government Resource
http://www.securityfocus.com/archive/1/186418 Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/2771 Broken Link Exploit Patch Third Party Advisory VDB Entry Vendor Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:anybus:ipc\@chip_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:anybus:ipc\@chip:-:*:*:*:*:*:*:*

History

20 Nov 2024, 23:37

Type Values Removed Values Added
References () http://cert.uni-stuttgart.de/archive/bugtraq/2001/06/msg00010.html - Broken Link () http://cert.uni-stuttgart.de/archive/bugtraq/2001/06/msg00010.html - Broken Link
References () http://www.iss.net/security_center/static/6605.php - Broken Link, Vendor Advisory () http://www.iss.net/security_center/static/6605.php - Broken Link, Vendor Advisory
References () http://www.kb.cert.org/vuls/id/198979 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/198979 - Third Party Advisory, US Government Resource
References () http://www.securityfocus.com/archive/1/186418 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/186418 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/2771 - Broken Link, Exploit, Patch, Third Party Advisory, VDB Entry, Vendor Advisory () http://www.securityfocus.com/bid/2771 - Broken Link, Exploit, Patch, Third Party Advisory, VDB Entry, Vendor Advisory

09 Feb 2024, 03:15

Type Values Removed Values Added
CPE cpe:2.3:a:beck_ipc_gmbh:ipc_at_chip_embedded-webserver:*:*:*:*:*:*:*:* cpe:2.3:o:anybus:ipc\@chip_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:anybus:ipc\@chip:-:*:*:*:*:*:*:*
References () http://cert.uni-stuttgart.de/archive/bugtraq/2001/06/msg00010.html - () http://cert.uni-stuttgart.de/archive/bugtraq/2001/06/msg00010.html - Broken Link
References () http://www.iss.net/security_center/static/6605.php - Vendor Advisory () http://www.iss.net/security_center/static/6605.php - Broken Link, Vendor Advisory
References () http://www.kb.cert.org/vuls/id/198979 - US Government Resource () http://www.kb.cert.org/vuls/id/198979 - Third Party Advisory, US Government Resource
References () http://www.securityfocus.com/archive/1/186418 - () http://www.securityfocus.com/archive/1/186418 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/2771 - Exploit, Patch, Vendor Advisory () http://www.securityfocus.com/bid/2771 - Broken Link, Exploit, Patch, Third Party Advisory, VDB Entry, Vendor Advisory
First Time Anybus ipc\@chip Firmware
Anybus
Anybus ipc\@chip
CVSS v2 : 7.5
v3 : unknown
v2 : 7.5
v3 : 9.8
CWE NVD-CWE-Other CWE-307

Information

Published : 2001-05-24 04:00

Updated : 2024-11-20 23:37


NVD link : CVE-2001-1339

Mitre link : CVE-2001-1339

CVE.ORG link : CVE-2001-1339


JSON object : View

Products Affected

anybus

  • ipc\@chip
  • ipc\@chip_firmware
CWE
CWE-307

Improper Restriction of Excessive Authentication Attempts