Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-773 | GEN000880 | SV-37347r1_rule | ECLP-1 IAIA-1 IAIA-2 | Medium |
Description |
---|
If an account has a UID of 0, it has root authority. Multiple accounts with a UID of 0 afford more opportunity for potential intruders to guess a password for a privileged account. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 5 Security Technical Implementation Guide | 2014-01-09 |
Check Text ( C-36039r1_chk ) |
---|
Check the system for duplicate UID 0 assignments by listing all accounts assigned UID 0. Procedure: # cat /etc/passwd | awk -F":" '{print$1":"$3":"}' | grep ":0:" If any accounts other than root are assigned UID 0, this is a finding. |
Fix Text (F-31283r1_fix) |
---|
Remove or change the UID of accounts other than root that have UID 0. |