Beck IPC GmbH IPC@CHIP telnet service does not delay or disconnect users from the service when bad passwords are entered, which makes it easier for remote attackers to conduct brute force password guessing attacks.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/2771 | Exploit Patch Vendor Advisory |
http://www.iss.net/security_center/static/6605.php | Vendor Advisory |
http://cert.uni-stuttgart.de/archive/bugtraq/2001/06/msg00010.html | |
http://www.securityfocus.com/archive/1/186418 | |
http://www.kb.cert.org/vuls/id/198979 | US Government Resource |
Configurations
Information
Published : 2001-05-23 21:00
Updated : 2008-09-05 13:26
NVD link : CVE-2001-1339
Mitre link : CVE-2001-1339
JSON object : View
CWE
Products Affected
beck_ipc_gmbh
- ipc_at_chip_embedded-webserver