Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-4428 | GEN002060 | SV-37385r1_rule | ECLP-1 | Medium |
Description |
---|
If these files are accessible by users other than root or the owner, they could be used by a malicious user to set up a system compromise. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 5 Security Technical Implementation Guide | 2016-07-22 |
Check Text ( None ) |
---|
None |
Fix Text (F-31316r1_fix) |
---|
Ensure the permission for these files is set to 600 or more restrictive and their owner is root or the same as the owner of the home directory in which they reside. Procedure: # chmod 600 /etc/hosts.equiv # chmod 600 /etc/ssh/shosts.equiv # chown root /etc/hosts.equiv # chown root /etc/ssh/shosts.equiv # find / -name .rhosts # chmod 600 / # chown # find / -name .shosts # chmod 600 # chown # find / -name .netrc # chmod 600 # chown |