Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-989 | GEN003380 | SV-37520r1_rule | DCSL-1 | Medium |
Description |
---|
If "at" programs are located in, or subordinate, to world-writable directories, they become vulnerable to removal and replacement by malicious users or system intruders. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 5 Security Technical Implementation Guide | 2013-01-17 |
Check Text ( C-36180r1_chk ) |
---|
List any "at" jobs on the system. Procedure: # ls /var/spool/at For each "at" job, determine which programs are executed by "at." Procedure: # more Check the directory containing each program executed by "at" for world-writable permissions. Procedure: # ls -la If "at" executes programs in world-writable directories, this is a finding. |
Fix Text (F-31432r1_fix) |
---|
Remove the world-writable permission from directories containing programs executed by "at". Procedure: # chmod o-w |