CVE Vulnerabilities

CVE-2011-4931

Weak Password Requirements

Published: Oct 29, 2019 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:N
RedHat/V2
RedHat/V3
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

gpw generates shorter passwords than required

Weakness

The product does not require that users should have strong passwords.

Affected Software

NameVendorStart VersionEnd Version
GpwGpw_project0.0.19940601-8.1 (including)0.0.19940601-8.1 (including)
GpwUbuntuartful*
GpwUbuntubionic*
GpwUbuntucosmic*
GpwUbuntudevel*
GpwUbuntudisco*
GpwUbuntueoan*
GpwUbuntuesm-apps/bionic*
GpwUbuntuesm-apps/focal*
GpwUbuntuesm-apps/jammy*
GpwUbuntuesm-apps/noble*
GpwUbuntuesm-apps/xenial*
GpwUbuntufocal*
GpwUbuntugroovy*
GpwUbuntuhardy*
GpwUbuntuhirsute*
GpwUbuntuimpish*
GpwUbuntujammy*
GpwUbuntukinetic*
GpwUbuntulucid*
GpwUbuntulunar*
GpwUbuntumantic*
GpwUbuntumaverick*
GpwUbuntunatty*
GpwUbuntunoble*
GpwUbuntuoneiric*
GpwUbuntuoracular*
GpwUbuntuplucky*
GpwUbuntuprecise*
GpwUbuntuquantal*
GpwUbuntuquesting*
GpwUbunturaring*
GpwUbuntusaucy*
GpwUbuntutrusty*
GpwUbuntuutopic*
GpwUbuntuvivid*
GpwUbuntuwily*
GpwUbuntuxenial*
GpwUbuntuyakkety*
GpwUbuntuzesty*

Potential Mitigations

  • A product’s design should require adherance to an appropriate password policy. Specific password requirements depend strongly on contextual factors, but it is recommended to contain the following attributes:

  • Depending on the threat model, the password policy may include several additional attributes.

  • See NIST 800-63B [REF-1053] for further information on password requirements.

References