[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247974

 
 

909

 
 

194654

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CCE
view XML

CCE-91911-8

Platform: cpe:/o:ubuntu:ubuntu_linux:16.04Date: (C)2018-07-09   (M)2023-07-06



Setting the boot loader password will require that anyone rebooting the system must enter a password before being able to set command line boot parameters Rationale: Requiring a boot password upon execution of the boot loader will prevent an unauthorized user from entering boot parameters or changing the boot partition. This prevents users from weakening security (e.g. turning off SELinux at boot time). Fix: Create an encrypted password with grub-md5-crypt: # grub-mkpasswd-pbkdf2 Enter password: <password> Reenter password: <password> Your PBKDF2 is <encrypted-password> Add the following into /etc/grub.d/00_header or a custom /etc/grub.d configuration file: cat <<EOF set superusers=<user-list> password_pbkdf2 <user> <encrypted-password> EOF Unless the -unrestricted option is added to CLASS in /etc/grub.d/10_linux a password will be required to boot in addition to editing boot parameters: CLASS=-class gnu-linux -class gnu -class os -unrestricted Run the following to update the grub configuration: # update-grub


Parameter:

[yes/no]


Technical Mechanism:

Create an encrypted password with grub-md5-crypt: # grub-mkpasswd-pbkdf2 Enter password: password Reenter password: password Your PBKDF2 is encrypted-password Add the following into /etc/grub.d/00_header or a custom /etc/grub.d configuration file: cat EOF set superusers= user-list password_pbkdf2 user encrypted-password EOF Unless the -unrestricted option is added to CLASS in /etc/grub.d/10_linux a password will be required to boot in addition to editing boot parameters: CLASS=-class gnu-linux -class gnu -class os -unrestricted Run the following to update the grub configuration: # update-grub

CCSS Severity:CCSS Metrics:
CCSS Score : 6.3Attack Vector: PHYSICAL
Exploit Score: 0.4Attack Complexity: HIGH
Impact Score: 5.9Privileges Required: LOW
Severity: MEDIUMUser Interaction: NONE
Vector: AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:HScope: UNCHANGED
 Confidentiality: HIGH
 Integrity: HIGH
 Availability: HIGH
  

References:
Resource IdReference
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:46172


OVAL    1
oval:org.secpod.oval:def:46172
XCCDF    1
xccdf_org.secpod_benchmark_general_Ubuntu_16_04

© SecPod Technologies