UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

All files and directories must have a valid owner.


Overview

Finding ID Version Rule ID IA Controls Severity
V-785 GEN001160 SV-37161r1_rule ECCD-1 ECCD-2 Medium
Description
Un-owned files and directories may be unintentionally inherited if a user is assigned the same UID as the UID of the un-owned files.
STIG Date
Red Hat Enterprise Linux 5 Security Technical Implementation Guide 2013-01-17

Details

Check Text ( C-35868r1_chk )
Check the system for files with no assigned owner.

Procedure:
# find / -nouser

If any files have no assigned owner, this is a finding.

Caution should be used when centralized authorization is used because valid files may appear as unowned due to communication issues.


Fix Text (F-31123r1_fix)
All directories and files (executable and data) will have an identifiable owner and group name. Either trace files to an authorized user, change the file's owner to root, or delete them. Determine the legitimate owner of the files and use the chown command to set the owner and group to the correct value. If the legitimate owner cannot be determined, change the owner to root (but make sure none of the changed files remain executable because they could be Trojan horses or other malicious code). Examine the files to determine their origin and the reason for their lack of an owner/group.