UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The /var/adm/userdb/USERDB.DISABLED file must be owned by root.


Overview

Finding ID Version Rule ID IA Controls Severity
V-40451 GEN000000-HPUX0280 SV-52438r1_rule ECLP-1 Medium
Description
Unless the userdb is required, the /var/adm/userdb/USERDB.DISABLED file must be created to disable the use of per-user security attributes in the user database. Attributes in the user database override the system-wide settings configured in /etc/default/security. If the system-wide configuration is overridden maliciously, users may gain unauthorized system access.
STIG Date
HP-UX 11.31 Security Technical Implementation Guide 2018-09-14

Details

Check Text ( C-47011r3_chk )
If the system is configured for Trusted Mode, this check is not applicable.

For SMSE:
If the userdb is required, this check is not applicable.

Verify the file is owned by root.
# ls -lL /var/adm/userdb/USERDB.DISABLED

If the file is not owned by root, this is a finding.
Fix Text (F-45400r1_fix)
If the system is operating in Trusted Mode, no fix is required.

For SMSE:
As root, change the file ownership.
# chown root /var/adm/userdb/USERDB.DISABLED