UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The "at" daemon must not execute programs in, or subordinate to, world-writable directories.


Overview

Finding ID Version Rule ID IA Controls Severity
V-989 GEN003380 SV-37520r1_rule DCSL-1 Medium
Description
If "at" programs are located in, or subordinate, to world-writable directories, they become vulnerable to removal and replacement by malicious users or system intruders.
STIG Date
Red Hat Enterprise Linux 5 Security Technical Implementation Guide 2013-07-03

Details

Check Text ( C-36180r1_chk )
List any "at" jobs on the system.
Procedure:
# ls /var/spool/at

For each "at" job, determine which programs are executed by "at."
Procedure:
# more

Check the directory containing each program executed by "at" for world-writable permissions.
Procedure:
# ls -la

If "at" executes programs in world-writable directories, this is a finding.
Fix Text (F-31432r1_fix)
Remove the world-writable permission from directories containing programs executed by "at".

Procedure:
# chmod o-w