CCE-92499-3Platform: cpe:/o:oracle:linux:7 | Date: (C)2019-11-07 (M)2023-07-04 |
To configure the system to lock out accounts after a number of incorrect login
attempts and require an administrator to unlock the account using 'pam_faillock.so',
modify the content of both '/etc/pam.d/system-auth' and '/etc/pam.d/password-auth' as follows:
add the following line immediately 'before' the 'pam_unix.so' statement in the 'AUTH' section:
auth required pam_faillock.so preauth silent deny=3 unlock_time=1800 fail_interval=900
add the following line immediately 'after' the 'pam_unix.so' statement in the 'AUTH' section:
auth [default=die] pam_faillock.so authfail deny=3 unlock_time=1800 fail_interval=900
add the following line immediately 'before' the 'pam_unix.so' statement in the 'ACCOUNT' section:
account required pam_faillock.so
Parameter:
[1800_seconds]
Technical Mechanism:
Locking out user accounts after a number of incorrect attempts
prevents direct password guessing attacks. Ensuring that an administrator is
involved in unlocking locked accounts draws appropriate attention to such
situations.
CCSS Severity: | CCSS Metrics: |
CCSS Score : 7.5 | Attack Vector: NETWORK |
Exploit Score: 3.9 | Attack Complexity: LOW |
Impact Score: 3.6 | Privileges Required: NONE |
Severity: HIGH | User Interaction: NONE |
Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H | Scope: UNCHANGED |
| Confidentiality: NONE |
| Integrity: NONE |
| Availability: HIGH |
| |
References: Resource Id | Reference |
---|
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:49441 |