Check: SLEM-05-611055
      
      
        
  SUSE Linux Enterprise Micro (SLEM) 5 STIG:
  SLEM-05-611055
  
    (in versions v1 r2 through v1 r1)
  
      
      
    
  Title
SLEM 5 must not be configured to allow blank or null passwords. (Cat I impact)
Discussion
Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily compromised.
Check Content
Verify SLEM 5 is not configured to allow blank or null passwords with the following command: > grep pam_unix.so /etc/pam.d/* | grep nullok If this produces any output, this is a finding.
Fix Text
Configure SLEM 5 to not allow blank or null passwords. Remove any instances of the "nullok" option in "/etc/pam.d/common-auth" and "/etc/pam.d/common-password" to prevent logons with empty passwords.
Additional Identifiers
Rule ID: SV-261386r996587_rule
Vulnerability ID: V-261386
Group Title: SRG-OS-000480-GPOS-00227
Expert Comments
      
        
        
      
      
        
  CCIs
      
      
        
        
      
    
  | Number | Definition | 
|---|---|
| CCI-000366 | 
           Implement the security configuration settings.  | 
      
      
        
        
      
      
        
  Controls
      
      
        
        
      
    
  | Number | Title | 
|---|---|
| CM-6 | 
           Configuration Settings  |