Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-4427 | GEN002020 | SV-38438r1_rule | ECCD-1 ECCD-2 | Medium |
Description |
---|
If these files are not properly configured, they could allow malicious access by unknown malicious users from untrusted hosts who could compromise the system. |
STIG | Date |
---|---|
HP-UX 11.23 Security Technical Implementation Guide | 2015-06-12 |
Check Text ( C-36375r1_chk ) |
---|
Locate and examine all .rhosts, .shosts, hosts.equiv, and shosts.equiv files. Procedure: # find / -name .rhosts # more / # find / -name .shosts # more / # find / -name hosts.equiv # more / # find / -name shosts.equiv # more / If any .rhosts, .shosts, hosts.equiv, or shosts.equiv file contains anything other than host-user pairs, this is a finding. |
Fix Text (F-32971r1_fix) |
---|
Locate and examine all .rhosts, .shosts, hosts.equiv, and shosts.equiv files. Procedure: # find / -name .rhosts # more / # find / -name .shosts # more / # find / -name hosts.equiv # more / # find / -name shosts.equiv # more / If any .rhosts, .shosts, hosts.equiv, or shosts.equiv file contains anything other than host-user pairs, this is a finding. |