Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-986 | GEN003320 | SV-37517r1_rule | ECPA-1 | Medium |
Description |
---|
Default accounts, such as bin, sys, adm, uucp, daemon, and others, should never have access to the "at" facility. This would create a possible vulnerability open to intruders or malicious users. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 5 Security Technical Implementation Guide | 2014-07-02 |
Check Text ( None ) |
---|
None |
Fix Text (F-31427r1_fix) |
---|
Remove the default accounts (such as bin, sys, adm, and others, traditionally UID less than 500) from the at.allow file. |