UCF STIG Viewer Logo

The .Xauthority utility must only permit access to authorized hosts.


Overview

Finding ID Version Rule ID IA Controls Severity
V-12017 GEN005240 SV-37685r1_rule ECCD-1 ECCD-2 Medium
Description
If unauthorized clients are permitted access to the X server, a user's X session may be compromised.
STIG Date
Red Hat Enterprise Linux 5 Security Technical Implementation Guide 2015-06-12

Details

Check Text ( C-36877r1_chk )
Check the X window system access is limited to authorized clients.

Procedure:
# xauth
xauth> list

Ask the SA if the clients listed are authorized. If any are not, this is a finding.

Fix Text (F-31867r1_fix)
Remove unauthorized clients from the xauth configuration.
# xauth remove