UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Device files and directories must only be writable by users with a system account or as configured by the vendor.


Overview

Finding ID Version Rule ID IA Controls Severity
V-924 GEN002280 SV-38505r1_rule ECCD-1 ECCD-2 ECLP-1 Medium
Description
System device files in writable directories could be modified, removed, or used by an unprivileged user to control system hardware.
STIG Date
HP-UX 11.31 Security Technical Implementation Guide 2015-06-12

Details

Check Text ( C-36415r1_chk )
Find all device special files existing anywhere on the system. Types include: b=block, c=character, p=fifo.

Example:
# find / -type b -print >> devicelist
# find / -type c -print >> devicelist
# find / -type p -print >> devicelist

Check the permissions on the directories above subdirectories that contain device files. If any device file, or directory containing device files, is world-writable, except device files specifically intended to be world-writable such as /dev/null, this is a finding.

Note the following exception/exclusion list:

/dev/pts/*, /dev/pty/*, /dev/ptym/*, the following in dev: full, zero, null, tty, ptmx, pty*, tcp, udp, ip, arp, udp6, tcp6, rawip6, ip6, rawip, rtsock, ipsecpol, ipseckey, sad, dlpi*, sasd*, ttyp*, ttyq*, ttyr*, strlog, telnetm, tlclts, asyncdsk, async, tlcots, tlcotsod, echo, beep, gvid0, gvid, poll, log, log.um, stcpmap, nuls, usctp6, sctp6, usctp and sctp.

Fix Text (F-31753r1_fix)
Remove the world-writable permission from the device file(s).

# chmod o-w

Document all changes.