CCE-92423-3Platform: cpe:/o:oracle:linux:7 | Date: (C)2019-11-07 (M)2023-07-04 |
In '/etc/pam.d/system-auth', the 'password' section of
the file controls which PAM modules execute during a password change.
Set the 'pam_unix.so' module in the
'password' section to include the argument 'sha512', as shown below:
'password sufficient pam_unix.so sha512 other arguments...'
This will help ensure when local users change their passwords, hashes for the new
passwords will be generated using the SHA-512 algorithm.
This is the default.
Parameter:
[yes/no]
Technical Mechanism:
Using a stronger hashing algorithm makes password cracking attacks more difficult.
CCSS Severity: | CCSS Metrics: |
CCSS Score : 8.1 | Attack Vector: NETWORK |
Exploit Score: 2.2 | Attack Complexity: HIGH |
Impact Score: 5.9 | Privileges Required: NONE |
Severity: HIGH | User Interaction: NONE |
Vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H | Scope: UNCHANGED |
| Confidentiality: HIGH |
| Integrity: HIGH |
| Availability: HIGH |
| |
References: Resource Id | Reference |
---|
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:49365 |