Vulnerability Note VU#756019

Beck IPC@Chip TelnetD vulnerable to account lockout via idle telnet connection

Original Release date: 17 Sep 2001 | Last revised: 14 Apr 2003

Overview

There is a vulnerability in the Beck IPC@CHIP that allows an attacker to create a denial-of-service condition.

Description

The Beck IPC@CHIP is a single chip embedded webserver. This device contains a telnet server that is configured by default to not have a login timeout. Additionally, this telnet server only pemits one user to connect at any given time. Because there is no timeout set on the telnet server login and only one user can login at a time, a malicious user can connect to the service and remain idle at a login prompt. By sitting idle at the prompt, the attacker is able to keep any other legitimate user or the administrator from logging into the device via telnet.

Impact

Unless the administrator changes the default settings on the Beck IPC@CHIP, an attacker can prevent the system administrator or any other valid user from logging into the device via telnet.

Solution

Change the default settings on the telnet server to allow for a login timeout.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Beck GmbHAffected21 May 200117 Sep 2001
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

This vulnerability was discovered by Sentry Research Labs.

This document was written by Ian A. Finlay.

Other Information

  • CVE IDs: CAN-2001-1340
  • Date Public: 24 May 2001
  • Date First Published: 17 Sep 2001
  • Date Last Updated: 14 Apr 2003
  • Severity Metric: 2.81
  • Document Revision: 34

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.