CCE-92314-4Platform: cpe:/o:amazon:linux:2 | Date: (C)2018-10-29 (M)2023-07-04 |
To properly set the permissions of '/etc/passwd', run the command:
Parameter:
[perm_644]
Technical Mechanism:
If the '/etc/passwd' file is writable by a group-owner or the
world the risk of its compromise is increased. The file contains the list of
accounts on the system and associated information, and protection of this file
is critical for system security.
CCSS Severity: | CCSS Metrics: |
CCSS Score : 8.4 | Attack Vector: LOCAL |
Exploit Score: 2.5 | Attack Complexity: LOW |
Impact Score: 5.9 | Privileges Required: NONE |
Severity: HIGH | User Interaction: NONE |
Vector: AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | Scope: UNCHANGED |
| Confidentiality: HIGH |
| Integrity: HIGH |
| Availability: HIGH |
| |
References: Resource Id | Reference |
---|
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:48501 |
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:48814 |