| VID |
14249 |
| Severity |
30 |
| Port |
22 |
| Protocol |
TCP |
| Class |
LSC |
| Detailed Description |
The ALTIBASE login failure lock policy setting on the remote host is not secure. If you do not limit the number of failed login attempts, there is a risk that an attacker may obtain a password through brute force attacks.
* Platforms Affected: UNIX, Linux |
| Recommendation |
Solution 1. Change Password Policy for Each User 1.1 Confirm Password Policy Setting select * from system_.sys_users_; 1.2 Setting Password Policy for the Following Properties FAILED_LOGIN_ATTEMPTS
¡Ø Use the following command to apply the policy. ALTER USER username LIMIT (property number); example) ALTER USER TESTUSER LIMIT (FAILED_LOGIN_ATTEMPTS 7);
Solution 2. ALTIBASE HDB Property File Change $ALTIBASE_HOME/conf/altibase.properties |
| Related URL |
(CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|