CVE-2001-1341
CVSS5.0
发布时间 :2001-05-24 00:00:00
修订时间 :2008-09-10 15:10:19
NMCOS    

[原文]The Beck GmbH IPC@Chip embedded web server installs the chipcfg.cgi program by default, which allows remote attackers to obtain sensitive network information via a request to the program.


[CNNVD]Beck IPC GmbH IPC@CHIP Network信息泄露漏洞(CNNVD-200105-094)

        Beck GmbH IPC@Chip嵌入的web服务器默认安装chipcfg.cgi程序,远程攻击者借助到该程序的请求获取敏感网络信息。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1341
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-1341
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200105-094
(官方数据源) CNNVD

- 其它链接及资源

http://www.kb.cert.org/vuls/id/574739
(UNKNOWN)  CERT-VN  VU#574739
http://www.securityfocus.com/bid/2767
(VENDOR_ADVISORY)  BID  2767
http://www.securityfocus.com/archive/1/186418
(UNKNOWN)  BUGTRAQ  20010524 IPC@Chip Security
http://www.iss.net/security_center/static/6600.php
(VENDOR_ADVISORY)  XF  ipcchip-chipcfg-gain-information(6600)
http://cert.uni-stuttgart.de/archive/bugtraq/2001/06/msg00010.html
(UNKNOWN)  BUGTRAQ  20010602 IPC@Chip - Fixes

- 漏洞信息

Beck IPC GmbH IPC@CHIP Network信息泄露漏洞
中危 设计错误
2001-05-24 00:00:00 2005-10-20 00:00:00
远程  
        Beck GmbH IPC@Chip嵌入的web服务器默认安装chipcfg.cgi程序,远程攻击者借助到该程序的请求获取敏感网络信息。

- 公告与补丁

        The vendor reports: "The API allows removal of this CGI with the CGI_REMOVE function".

- 漏洞信息

14268
Beck IPC GmbH IPC@Chip Web Server chipcfg.cgi Direct Request Information Disclosure
Remote / Network Access Information Disclosure
Loss of Confidentiality Workaround
Exploit Public Vendor Verified

- 漏洞描述

Beck IPC GmbH IPC@Chip Web Server contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered by sending a direct request to the the 'chipcfg.cgi' script, which will disclose network configuration settings to a remote attacker resulting in a loss of confidentiality.

- 时间线

2001-05-24 Unknow
2001-05-24 2001-06-01

- 解决方案

Currently, there are no known upgrades or patches to correct this vulnerability. It is possible to temporarily work around the flaw by implementing the following workaround: consult the vendor's documentation for the API CGI_REMOVE function.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Beck IPC GmbH IPC@CHIP Network Information Disclosure Vulnerability
Design Error 2767
Yes No
2001-05-24 12:00:00 2009-07-11 06:06:00
Discovered and posted to Bugtraq by Siberian <i.am.a@x-men.com> on May 21, 2001.

- 受影响的程序版本

Beck IPC GmbH IPC@CHIP Embedded-Webserver

- 漏洞讨论

A vulnerability exists in IPC@CHIP which could enable a remote user to gain access to ChipCfg.cgi. A specially crafted URL for ChipCfg.cgi will return sensitive network data. ChipCfg.cgi is installed by default. The vendor reports that it can be uninstalled.

- 漏洞利用

Currently the SecurityFocus staff are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com &lt;mailto:vuldb@securityfocus.com&gt;.

- 解决方案

The vendor reports: "The API allows removal of this CGI with the CGI_REMOVE function".

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站