GEN001475 - The /etc/group file must not contain any group password hashes.

Information

Group passwords are typically shared and should not be used. Additionally, if password hashes are readable by non-administrators, the passwords are subject to attack through lookup tables or cryptographic weaknesses in the hashes.

Solution

Edit /etc/group and change the password field to an exclamation point (!) to lock the group password.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_5_V2R1_STIG.zip

Item Details

Category: ACCESS CONTROL, CONFIGURATION MANAGEMENT

References: 800-53|AC-6, 800-53|CM-6b., CAT|II, CCI|CCI-000225, CCI|CCI-000366, Rule-ID|SV-218307r603259_rule, STIG-ID|GEN001475, STIG-Legacy|SV-64583, STIG-Legacy|V-22348, Vuln-ID|V-218307

Plugin: Unix

Control ID: db93ee296a2590e77a3ab449cbd6fc71bc345ac0ad8a54f802697f19df68d14f