[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CCE
view XML

CCE-94436-3

Platform: cpe:/o:oracle:linux:8, cpe:/o:redhat:enterprise_linux:8, cpe:/o:redhat:enterprise_linux:9Date: (C)2019-11-07   (M)2023-07-04



The pam_pwquality module's 'maxrepeat' parameter controls requirements for consecutive repeating characters. When set to a positive number, it will reject passwords which contain more than that number of consecutive characters. Modify the 'maxrepeat' setting in '/etc/security/pwquality.conf' to prevent a run of (


Parameter:

[max_repeat_char]


Technical Mechanism:

Passwords with excessive repeating characters may be more vulnerable to password-guessing attacks.

CCSS Severity:CCSS Metrics:
CCSS Score : 8.1Attack Vector: NETWORK
Exploit Score: 2.2Attack Complexity: HIGH
Impact Score: 5.9Privileges Required: NONE
Severity: HIGHUser Interaction: NONE
Vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HScope: UNCHANGED
 Confidentiality: HIGH
 Integrity: HIGH
 Availability: HIGH
  

References:
Resource IdReference
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:72235
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:55828
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:84110


OVAL    3
oval:org.secpod.oval:def:84110
oval:org.secpod.oval:def:72235
oval:org.secpod.oval:def:55828
XCCDF    3
xccdf_org.secpod_benchmark_general_RHEL_8
xccdf_org.secpod_benchmark_general_OEL_8
xccdf_org.secpod_benchmark_general_RHEL_9

© SecPod Technologies