Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-977 | GEN003020 | SV-38544r1_rule | DCSL-1 | Medium |
Description |
---|
If cron programs are located in or subordinate to world-writable directories, they become vulnerable to removal and replacement by malicious users or system intruders. |
STIG | Date |
---|---|
HP-UX 11.31 Security Technical Implementation Guide | 2018-03-01 |
Check Text ( C-36433r1_chk ) |
---|
List all cronjobs on the system. Procedure: # ls -lL /var/spool/cron/crontabs If cron jobs exist under any of the above directories, search for programs executed by cron: Procedure: # more Determine if the directory containing programs executed from cron is world-writable. Procedure: # ls -lLd If cron executes programs in world-writable directories, this is a finding. |
Fix Text (F-31772r1_fix) |
---|
Remove the world-writable permission from the cron program directories identified. Procedure: # chmod o-w |