发布时间 :2001-05-24 00:00:00
修订时间 :2008-09-05 16:26:17

[原文]Beck IPC GmbH IPC@CHIP TelnetD server generates different responses when given valid and invalid login names, which allows remote attackers to determine accounts on the system.

[CNNVD]Beck IPC GmbH IPC@CHIP TelnetD账户列举漏洞(CNNVD-200105-093)

        当给予有效或者无效的注册名时,Beck IPC GmbH IPC@CHIP TelnetD server产生不同的响应,远程攻击者利用该漏洞确定系统中的账户。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(VENDOR_ADVISORY)  BUGTRAQ  20010524 IPC@Chip Security
(UNKNOWN)  BID  2773
(VENDOR_ADVISORY)  XF  ipcchip-telnet-verify-account(6595)
(UNKNOWN)  BUGTRAQ  20010602 IPC@Chip - Fixes

- 漏洞信息

Beck IPC GmbH IPC@CHIP TelnetD账户列举漏洞
中危 配置错误
2001-05-24 00:00:00 2005-10-20 00:00:00
        当给予有效或者无效的注册名时,Beck IPC GmbH IPC@CHIP TelnetD server产生不同的响应,远程攻击者利用该漏洞确定系统中的账户。

- 公告与补丁

        The vendor reports that this has been fixed, and that a "test version is available upon request."

- 漏洞信息

Beck IPC GmbH IPC@Chip TelnetD Server Error Message Account Enumeration
Remote / Network Access Information Disclosure
Loss of Confidentiality Upgrade
Exploit Public Vendor Verified

- 漏洞描述

Beck IPC GmbH IPC@Chip Telnet Server contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when the server sends a different response when provided an invalid versus a valid username, which may allow a remote attacker to enumerate user accounts resulting in a loss of confidentiality.

- 时间线

2001-05-24 Unknow
2001-05-24 2001-06-01

- 解决方案

Contact the vendor for an upgrade. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Beck IPC GmbH IPC@CHIP TelnetD Account Enumeration Vulnerability
Configuration Error 2773
Yes No
2001-05-24 12:00:00 2009-07-11 06:06:00
Reported to bugtraq by Siberian <> on May 24, 2001.

- 受影响的程序版本

Beck IPC GmbH IPC@CHIP Embedded-Webserver

- 漏洞讨论

The IPC@Chip is a single-chip embedded webserver from Beck GmbH.

The device's inbuilt telnetd service may allow a remote user to confirm names of valid telnet accounts.

When an attacker attempts to login to the telnet service with a given user ID, the attacker receives a prompt for the password only if the supplied account name exists. This confirms for the attacker that the given ID is valid.

In combination with brute-force password techniques, to which this device is reportedly vulnerable, this can permit a remote attacker to compromise arbitrary accounts on the system. Properly exploited, this can lead to a compromise of the device's normal operation.

- 漏洞利用

Currently the SecurityFocus staff are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: &lt;;.

- 解决方案

The vendor reports that this has been fixed, and that a "test version is available upon request."

- 相关参考