Korean
<< Back
VID 14073
Severity 20
Port 22
Protocol TCP
Class LSC
Detailed Description There are accounts which have no shell in the host system. Unauthorized users should be prohibited from using the system by restricting accounts which are not needed to log on the system to using a shell. accounts which are not needed to log on the system should be restricted to executing '/bin/sh' etc. and the accounts should be prohibited from login by setting shells to 'nologin' or 'bin/flase'

* Platforms Affected:
UNIX, Linux
Recommendation Insert /sbin/nologin or /bin/false in the last field of the user whose shell is not set in /etc/passwd
bin:x:1:1:bin:/bin:/sbin/nologin
nobody:x:99:99:Nobody:/:/sbin/nologin

or
Change the shell as the following command
chsh -s /sbin/nologin 'the ID of the user whose shell is not set'
Related URL (CVE)
Related URL (SecurityFocus)
Related URL (ISS)