UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The system must not have the rusersd service active.


Overview

Finding ID Version Rule ID IA Controls Severity
V-29515 GEN009310 SV-38719r1_rule ECSC-1 Medium
Description
The rusersd daemon gives out a list of current uses on the system. The rusersd daemon is unnecessary and it increases the attack vector of the system by providing information on the current users of the system.
STIG Date
Draft AIX Security Technical Implementation Guide 2011-08-17

Details

Check Text ( C-37815r1_chk )
Check the /etc/inetd.conf file for active rusersd service.

#grep rusersd /etc/inetd.conf | grep -v \#

If the rusersd service is enabled, this is a finding.
Fix Text (F-33073r1_fix)
Edit the /etc/inetd.conf file and comment out the rusersd service line.

Restart the inetd service.

#refresh –s inetd