Vulnerability Description
Beck GmbH IPC@Chip TelnetD service supports only one connection and does not disconnect a user who does not complete the login process, which allows remote attackers to lock out the administrator account by connecting to the service.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Beck Ipc Gmbh | Ipc At Chip Telnetd Server | All versions |
References
- http://cert.uni-stuttgart.de/archive/bugtraq/2001/06/msg00010.html
- http://www.iss.net/security_center/static/6596.phpVendor Advisory
- http://www.kb.cert.org/vuls/id/756019US Government Resource
- http://www.securityfocus.com/archive/1/186418
- http://www.securityfocus.com/bid/2772PatchVendor Advisory
- http://cert.uni-stuttgart.de/archive/bugtraq/2001/06/msg00010.html
- http://www.iss.net/security_center/static/6596.phpVendor Advisory
- http://www.kb.cert.org/vuls/id/756019US Government Resource
- http://www.securityfocus.com/archive/1/186418
- http://www.securityfocus.com/bid/2772PatchVendor Advisory
FAQ
What is CVE-2001-1340?
CVE-2001-1340 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Beck GmbH IPC@Chip TelnetD service supports only one connection and does not disconnect a user who does not complete the login process, which allows remote attackers to lock out the administrator acco...
How severe is CVE-2001-1340?
CVE-2001-1340 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2001-1340?
Check the references section above for vendor advisories and patch information. Affected products include: Beck Ipc Gmbh Ipc At Chip Telnetd Server.