CVE Vulnerabilities

CVE-2011-4931

Weak Password Requirements

Published: Oct 29, 2019 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:N
RedHat/V2
RedHat/V3
Ubuntu
LOW

gpw generates shorter passwords than required

Weakness

The product does not require that users should have strong passwords.

Affected Software

Name Vendor Start Version End Version
Gpw Gpw_project 0.0.19940601-8.1 (including) 0.0.19940601-8.1 (including)
Gpw Ubuntu artful *
Gpw Ubuntu bionic *
Gpw Ubuntu cosmic *
Gpw Ubuntu devel *
Gpw Ubuntu disco *
Gpw Ubuntu eoan *
Gpw Ubuntu esm-apps/bionic *
Gpw Ubuntu esm-apps/focal *
Gpw Ubuntu esm-apps/jammy *
Gpw Ubuntu esm-apps/noble *
Gpw Ubuntu esm-apps/xenial *
Gpw Ubuntu focal *
Gpw Ubuntu groovy *
Gpw Ubuntu hardy *
Gpw Ubuntu hirsute *
Gpw Ubuntu impish *
Gpw Ubuntu jammy *
Gpw Ubuntu kinetic *
Gpw Ubuntu lucid *
Gpw Ubuntu lunar *
Gpw Ubuntu mantic *
Gpw Ubuntu maverick *
Gpw Ubuntu natty *
Gpw Ubuntu noble *
Gpw Ubuntu oneiric *
Gpw Ubuntu oracular *
Gpw Ubuntu plucky *
Gpw Ubuntu precise *
Gpw Ubuntu quantal *
Gpw Ubuntu questing *
Gpw Ubuntu raring *
Gpw Ubuntu saucy *
Gpw Ubuntu trusty *
Gpw Ubuntu utopic *
Gpw Ubuntu vivid *
Gpw Ubuntu wily *
Gpw Ubuntu xenial *
Gpw Ubuntu yakkety *
Gpw Ubuntu zesty *

Potential Mitigations

  • A product’s design should require adherance to an appropriate password policy. Specific password requirements depend strongly on contextual factors, but it is recommended to contain the following attributes:

  • Depending on the threat model, the password policy may include several additional attributes.

  • See NIST 800-63B [REF-1053] for further information on password requirements.

References