Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-906 | GEN001580 | SV-37192r1_rule | ECLP-1 | Medium |
Description |
---|
If the startup files are writable by other users, they could modify the startup files to insert malicious commands into the startup files. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 5 Security Technical Implementation Guide | 2016-07-22 |
Check Text ( None ) |
---|
None |
Fix Text (F-32777r1_fix) |
---|
Ensure all system startup files have mode 0755 or less permissive. Examine the "rc" files, and all files in the rc1.d (rc2.d, and so on) directories, and in the /etc/init.d directory to ensure they are not world-writable. If they are world-writable, use the chmod command to correct the vulnerability and research why they are world-writable. Procedure: # chmod 755 |