[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CCE
view XML

CCE-95046-9

Platform: cpe:/o:debian:debian_linux:11.x, cpe:/o:ubuntu:ubuntu_linux:20.04, cpe:/o:ubuntu:ubuntu_linux:22.04, cpe:/o:ubuntu:ubuntu_linux:23.04Date: (C)2020-10-15   (M)2023-09-01



The pam_cracklib module checks the strength of passwords. It performs checks such as making sure a password is not a dictionary word, it is a certain length, contains a mix of characters (e.g. alphabet, numeric, other) and more. The following are definitions of the pam_cracklib.so options. * retry=3 - Allow 3 tries before sending back a failure. * minlen=14 - password must be 14 characters or more * dcredit=-1 - provide at least one digit * ucredit=-1 - provide at least one uppercase character * ocredit=-1 - provide at least one special character * lcredit=-1 - provide at least one lowercase character * enforcing=1 - will force user to follow the password policy rule The setting shown above is one possible policy. Alter these values to conform to your own organizations password policies. Rationale: Strong passwords protect systems from being hacked through brute force methods. Fix: Set the following parameters as mentioned below in /etc/security/pwquality.conf: minlen=14 dcredit=-1 ucredit=-1 ocredit=-1 lcredit=-1 enforcing=1 Set retry paramter as following in /etc/pam.d/common-password: password required pam_cracklib.so retry=3


Parameter:

[-2/-1/0, -2/-1/0, -2/-1/0, -2/-1/0, 3 attempts, minimum length 14 or more]


Technical Mechanism:

Set the following parameters as mentioned below in /etc/security/pwquality.conf: minlen=14 dcredit=-1 ucredit=-1 ocredit=-1 lcredit=-1 enforcing=1 Set retry paramter as following in /etc/pam.d/common-password: password required pam_cracklib.so retry=3

CCSS Severity:CCSS Metrics:
CCSS Score : 9.8Attack Vector: NETWORK
Exploit Score: 3.9Attack Complexity: LOW
Impact Score: 5.9Privileges Required: NONE
Severity: CRITICALUser Interaction: NONE
Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HScope: UNCHANGED
 Confidentiality: HIGH
 Integrity: HIGH
 Availability: HIGH
  

References:
Resource IdReference
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:85122
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:92190
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:65958
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:87305


OVAL    4
oval:org.secpod.oval:def:85122
oval:org.secpod.oval:def:65958
oval:org.secpod.oval:def:92190
oval:org.secpod.oval:def:87305
...
XCCDF    11
xccdf_org.secpod_benchmark_SecPod_Debian_11
xccdf_org.secpod_benchmark_SecPod_Ubuntu_23.04
xccdf_org.secpod_benchmark_SecPod_Ubuntu_22.04
xccdf_org.secpod_benchmark_SecPod_Ubuntu_20.04
...

© SecPod Technologies