Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-4427 | GEN002020 | SV-63611r1_rule | ECCD-1 ECCD-2 | Medium |
Description |
---|
If these files are not properly configured, they could allow malicious access by unknown malicious users from untrusted hosts who could compromise the system. |
STIG | Date |
---|---|
Oracle Linux 5 Security Technical Implementation Guide | 2015-03-26 |
Check Text ( C-52251r2_chk ) |
---|
Locate and examine all r-commands access control files. Procedure: # find / -name .rhosts # more / # find / -name .shosts # more / # find / -name hosts.equiv # more / # find / -name shosts.equiv # more / If any .rhosts, .shosts, hosts.equiv, or shosts.equiv file contains other than host-user pairs, this is a finding. |
Fix Text (F-54211r1_fix) |
---|
If possible, remove the .rhosts, .shosts, hosts.equiv, and shosts.equiv files. If the files are required, remove any content from the files except for necessary host-user pairs. |