UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

All local initialization files must be owned by the home directorys user or root.


Overview

Finding ID Version Rule ID IA Controls Severity
V-904 GEN001860 SV-37430r1_rule ECLP-1 Medium
Description
Local initialization files are used to configure the user's shell environment upon login. Malicious modification of these files could compromise accounts upon logon.
STIG Date
Red Hat Enterprise Linux 5 Security Technical Implementation Guide 2013-01-17

Details

Check Text ( C-35939r1_chk )
Check the ownership of local initialization files.

Procedure:
# ls -al //.login
# ls -al //.cshrc
# ls -al //.logout
# ls -al //.profile
# ls -al //.bash_profile
# ls -al //.bashrc
# ls -al //.bash_logout
# ls -al //.env
# ls -al //.dtprofile
# ls -al //.dispatch
# ls -al //.emacs
# ls -al //.exrc
# find //.dt ! -fstype nfs ! -user -exec ls -ld {} \;

If local initialization files are not owned by the home directory's user, this is a finding.
Fix Text (F-31196r1_fix)
Change the ownership of the startup and login files in the user's directory to the user or root, as appropriate. Examine each user's home directory and verify all filenames beginning with "." are owned by the owner of the directory or root. If they are not, use the chown command to change the owner to the user and research the reasons why the owners were not assigned as required.

Procedure:
# chown username .filename
Document all changes.