Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-773 | GEN000880 | SV-37347r2_rule | Medium |
Description |
---|
If an account has a UID of 0, it has root authority. Multiple accounts with a UID of 0 afford more opportunity for potential intruders to guess a password for a privileged account. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 5 Security Technical Implementation Guide | 2016-12-16 |
Check Text ( C-36039r2_chk ) |
---|
Check the system for duplicate UID 0 assignments by listing all accounts assigned UID 0. Procedure: # awk -F: '($3 == 0) { print $1 }' /etc/passwd If any accounts other than root are assigned UID 0, this is a finding. |
Fix Text (F-31283r1_fix) |
---|
Remove or change the UID of accounts other than root that have UID 0. |