CCE-95655-7Platform: cpe:/o:debian:debian_linux:11.x, cpe:/o:ubuntu:ubuntu_linux:16.04, cpe:/o:ubuntu:ubuntu_linux:18.04, cpe:/o:ubuntu:ubuntu_linux:20.04, cpe:/o:ubuntu:ubuntu_linux:22.04, cpe:/o:ubuntu:ubuntu_linux:23.04 | Date: (C)2021-03-08 (M)2023-09-01 |
The shadow group allows system programs which require access the ability to read the /etc/shadow file. No users should be assigned to the shadow group.
Rationale:
Any users assigned to the shadow group would be granted read access to the /etc/shadow file. If attackers can gain read access to the /etc/shadow file, they can easily run a password cracking program against the hashed passwords to break them. Other security information that is stored in the /etc/shadow file (such as expiration) could also be useful to subvert additional user accounts.
Fix:
Remove all users from the shadow group, and change the primary group of any users with shadow as their primary group.
Parameter:
[yes/no]
Technical Mechanism:
Remove all users from the shadow group, and change the primary group of any users with shadow as their primary group.
CCSS Severity: | CCSS Metrics: |
CCSS Score : 7.8 | Attack Vector: LOCAL |
Exploit Score: 1.8 | Attack Complexity: LOW |
Impact Score: 5.9 | Privileges Required: LOW |
Severity: HIGH | User Interaction: NONE |
Vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H | Scope: UNCHANGED |
| Confidentiality: HIGH |
| Integrity: HIGH |
| Availability: HIGH |
| |
References: Resource Id | Reference |
---|
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:70698 |
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:87375 |
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:70788 |
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:85232 |
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:68708 |
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:92217 |