Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-904 | GEN001860 | SV-37430r1_rule | ECLP-1 | Medium |
Description |
---|
Local initialization files are used to configure the user's shell environment upon login. Malicious modification of these files could compromise accounts upon logon. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 5 Security Technical Implementation Guide | 2013-04-10 |
Check Text ( C-35939r1_chk ) |
---|
Check the ownership of local initialization files. Procedure: # ls -al / # ls -al / # ls -al / # ls -al / # ls -al / # ls -al / # ls -al / # ls -al / # ls -al / # ls -al / # ls -al / # ls -al / # find / If local initialization files are not owned by the home directory's user, this is a finding. |
Fix Text (F-31196r1_fix) |
---|
Change the ownership of the startup and login files in the user's directory to the user or root, as appropriate. Examine each user's home directory and verify all filenames beginning with "." are owned by the owner of the directory or root. If they are not, use the chown command to change the owner to the user and research the reasons why the owners were not assigned as required. Procedure: # chown username .filename Document all changes. |