UCF STIG Viewer Logo

The cron.deny file must have mode 0600 or less permissive.


Overview

Finding ID Version Rule ID IA Controls Severity
V-4358 GEN003200 SV-27362r1_rule ECLP-1 Medium
Description
If file permissions for cron.deny are more permissive than 0600, sensitive information could be viewed or edited by unauthorized users.
STIG Date
Red Hat Enterprise Linux 5 Security Technical Implementation Guide 2017-03-01

Details

Check Text ( C-28506r1_chk )
Check the mode of the cron.deny file.
# ls -lL /etc/cron.deny
If the cron.deny file does not exist this is not a finding.
If the cron.deny file exists and the mode is more permissive than 0600, this is a finding.
Fix Text (F-24608r1_fix)
Change the mode of the cron.deny file.
# chmod 0600 /etc/cron.deny