Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-4427 | GEN002020 | SV-37437r1_rule | ECCD-1 ECCD-2 | Medium |
Description |
---|
If these files are not properly configured, they could allow malicious access by unknown malicious users from untrusted hosts who could compromise the system. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 5 Security Technical Implementation Guide | 2014-01-09 |
Check Text ( C-36055r1_chk ) |
---|
Locate and examine all r-commands access control files. Procedure: # find / -name .rhosts # more / # find / -name .shosts # more / # find / -name hosts.equiv # more / # find / -name shosts.equiv # more / If any .rhosts, .shosts, hosts.equiv, or shosts.equiv file contains other than host-user pairs, this is a finding. |
Fix Text (F-31299r1_fix) |
---|
If possible, remove the .rhosts, .shosts, hosts.equiv, and shosts.equiv files. If the files are required, remove any content from the files except for necessary host-user pairs. |