CCE-95739-9Platform: cpe:/o:ubuntu:ubuntu_linux:20.04 | Date: (C)2023-12-20 (M)2023-12-27 |
/etc/security/opasswd and it's backup /etc/security/opasswd.old hold user's previous passwords if pam_unix or pam_pwhistory is in use on the system.
Rationale:
It is critical to ensure that /etc/security/opasswd is protected from unauthorized access. Although it is protected by default, the file permissions could be changed either inadvertently or through malicious actions.Fix: Run the following commands to set permissions on /etc/security/opasswd: # chown root:root /etc/security/opasswd
Run the following commands to set permissions on /etc/security/opasswd.old if exists: # chown root:root /etc/security/opasswd.old
Parameter:
[0, 0, 110100100]
Technical Mechanism:
Run the following commands to set permissions on /etc/security/opasswd: # chown root:root /etc/security/opasswd # chmod u-x,go-wx /etc/security/opasswd
Run the following commands to set permissions on /etc/security/opasswd.old if exists: # chown root:root /etc/security/opasswd.old # chmod u-x,go-wx /etc/security/opasswd.old
CCSS Severity: | CCSS Metrics: |
CCSS Score : 8.8 | Attack Vector: LOCAL |
Exploit Score: 2.0 | Attack Complexity: LOW |
Impact Score: 6.0 | Privileges Required: LOW |
Severity: HIGH | User Interaction: NONE |
Vector: AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H | Scope: CHANGED |
| Confidentiality: HIGH |
| Integrity: HIGH |
| Availability: HIGH |
| |
References: Resource Id | Reference |
---|
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:95932 |