Lucene search

K
certCERTVU:756019
HistorySep 17, 2001 - 12:00 a.m.

Beck IPC@Chip TelnetD vulnerable to account lockout via idle telnet connection

2001-09-1700:00:00
www.kb.cert.org
10

0.027 Low

EPSS

Percentile

90.5%

Overview

There is a vulnerability in the Beck IPC@CHIP that allows an attacker to create a denial-of-service condition.

Description

The Beck IPC@CHIP is a single chip embedded webserver. This device contains a telnet server that is configured by default to not have a login timeout. Additionally, this telnet server only pemits one user to connect at any given time. Because there is no timeout set on the telnet server login and only one user can login at a time, a malicious user can connect to the service and remain idle at a login prompt. By sitting idle at the prompt, the attacker is able to keep any other legitimate user or the administrator from logging into the device via telnet.


Impact

Unless the administrator changes the default settings on the Beck IPC@CHIP, an attacker can prevent the system administrator or any other valid user from logging into the device via telnet.


Solution

Change the default settings on the telnet server to allow for a login timeout.


Vendor Information

756019

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Beck GmbH __ Affected

Notified: May 21, 2001 Updated: September 17, 2001

Status

Affected

Vendor Statement

Please see <http://cert.uni-stuttgart.de/archive/bugtraq/2001/06/msg00010.html&gt;

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23756019 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was discovered by Sentry Research Labs.

This document was written by Ian A. Finlay.

Other Information

CVE IDs: CVE-2001-1340
Severity Metric: 2.81 Date Public:

0.027 Low

EPSS

Percentile

90.5%

Related for VU:756019