UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The at.deny file must not be empty if it exists.


Overview

Finding ID Version Rule ID IA Controls Severity
V-985 GEN003300 SV-37516r1_rule ECLP-1 Medium
Description
On some systems, if there is no at.allow file and there is an empty at.deny file, then the system assumes everyone has permission to use the "at" facility. This could create an insecure setting in the case of malicious users or system intruders.
STIG Date
Red Hat Enterprise Linux 5 Security Technical Implementation Guide 2013-04-10

Details

Check Text ( C-36175r1_chk )
# more /etc/at.deny
If the at.deny file exists and is empty, this is a finding.
Fix Text (F-31426r1_fix)
Add appropriate users to the at.deny file, or remove the empty at.deny file if an at.allow file exists.