Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-22384 | GEN002990 | SV-37382r1_rule | ECLP-1 | Medium |
Description |
---|
A readable and/or writeable cron.allow file by other users than root could allow potential intruders and malicious users to use the file contents to help discern information, such as who is allowed to execute cron programs, which could be harmful to overall system and network security. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 5 Security Technical Implementation Guide | 2012-05-25 |
Check Text ( C-36069r1_chk ) |
---|
Check the permissions of the cron.allow file. # ls -l /etc/cron.allow If the permissions include a '+', the file has an extended ACL. If the file has an extended ACL and it has not been documented with the IAO, this is a finding. |
Fix Text (F-31313r1_fix) |
---|
Remove the extended ACL from the file. # setfacl --remove-all /etc/cron.allow |