Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-221723 | OL07-00-020310 | SV-221723r603260_rule | High |
Description |
---|
If an account other than root also has a User Identifier (UID) of "0", it has root authority, giving that account unrestricted access to the entire operating system. Multiple accounts with a UID of "0" afford an opportunity for potential intruders to guess a password for a privileged account. |
STIG | Date |
---|---|
Oracle Linux 7 Security Technical Implementation Guide | 2022-12-06 |
Check Text ( C-23438r419241_chk ) |
---|
Check the system for duplicate UID "0" assignments with the following command: # awk -F: '$3 == 0 {print $1}' /etc/passwd If any accounts other than root have a UID of "0", this is a finding. |
Fix Text (F-23427r419242_fix) |
---|
Change the UID of any account on the system, other than root, that has a UID of "0". If the account is associated with system commands or applications, the UID should be changed to one greater than "0" but less than "1000". Otherwise, assign a UID of greater than "1000" that has not already been assigned. |