[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253928

 
 

909

 
 

198006

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CCE
view XML

CCE-96174-8

Platform: cpe:/o:suse:suse_linux_enterprise_server:15Date: (C)2022-09-27   (M)2023-07-04



Without re-authentication, users may access resources or perform tasks for which they do not have authorization. When operating systems provide the capability to escalate a functional capability, it is critical the organization requires the user to re-authenticate when using the "sudo" command. If the value is set to an integer less than 0, the user's time stamp will not expire and the user will not have to re-authenticate for privileged actions until the user's session is terminated.


Parameter:

[0]


Technical Mechanism:

Fix:Configure the "sudo" command to require re-authentication. Edit the /etc/sudoers file: > sudo visudo Add or modify the following line: Defaults timestamp_timeout=[value] Note: The "[value]" must be a number that is greater than or equal to "0".

CCSS Severity:CCSS Metrics:
CCSS Score : 9.9Attack Vector: NETWORK
Exploit Score: 3.1Attack Complexity: LOW
Impact Score: 6.0Privileges Required: LOW
Severity: CRITICALUser Interaction: NONE
Vector: AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:HScope: CHANGED
 Confidentiality: HIGH
 Integrity: HIGH
 Availability: HIGH
  

References:
Resource IdReference
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:84394


OVAL    1
oval:org.secpod.oval:def:84394
XCCDF    2
xccdf_org.secpod_benchmark_general_SLES_15
xccdf_org.secpod_benchmark_SecPod_SLES_15

© SecPod Technologies