Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-40453 | GEN000000-HPUX0300 | SV-52440r1_rule | ECLP-1 | Medium |
Description |
---|
Unless the userdb is required, the /var/adm/userdb/USERDB.DISABLED file must be created to disable the use of per-user security attributes in the user database. Attributes in the user database override the system-wide settings configured in /etc/default/security. If the system-wide configuration is overridden maliciously, users may gain unauthorized system access. |
STIG | Date |
---|---|
HP-UX 11.31 Security Technical Implementation Guide | 2018-09-14 |
Check Text ( C-47013r2_chk ) |
---|
If the system is configured for Trusted Mode, this check is not applicable. For SMSE: If the userdb is required, this check is not applicable. Verify the file mode. # ls -lL /var/adm/userdb/USERDB.DISABLED If the file mode is more permissive than 0444, this is a finding. |
Fix Text (F-45402r1_fix) |
---|
If the system is operating in Trusted Mode, no fix is required. For SMSE: As root, change the file mode to 0444 or less permissive. # chmod 0444 /var/adm/userdb/USERDB.DISABLED |