[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CCE
view XML

CCE-92294-8

Platform: cpe:/o:amazon:linux:2Date: (C)2018-10-29   (M)2023-07-04



Some accounts are not associated with a human user of the system, and exist to perform some administrative function. Should an attacker be able to log into these accounts, they should not be granted access to a shell. The login shell for each local account is stored in the last field of each line in '/etc/passwd'. System accounts are those user accounts with a user ID less than 1000. The user ID is stored in the third field. If any system account


Parameter:

[UID_1/UID_2]


Technical Mechanism:

Ensuring shells are not given to system accounts upon login makes it more difficult for attackers to make use of system accounts.

CCSS Severity:CCSS Metrics:
CCSS Score : 8.8Attack Vector: NETWORK
Exploit Score: 2.8Attack Complexity: LOW
Impact Score: 5.9Privileges Required: LOW
Severity: HIGHUser Interaction: NONE
Vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HScope: UNCHANGED
 Confidentiality: HIGH
 Integrity: HIGH
 Availability: HIGH
  

References:
Resource IdReference
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:48994
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:48481


OVAL    2
oval:org.secpod.oval:def:48481
oval:org.secpod.oval:def:48994
XCCDF    2
xccdf_org.secpod_benchmark_general_Amazon_Linux_AMI
xccdf_org.secpod_benchmark_general_Amazon_Linux_2

© SecPod Technologies