UCF STIG Viewer Logo

All public directories must be owned by a system account.


Overview

Finding ID Version Rule ID IA Controls Severity
V-218068 RHEL-06-000337 SV-218068r505923_rule Low
Description
Allowing a user account to own a world-writable directory is undesirable because it allows the owner of that directory to remove or replace any files that may be placed in the directory by other users.
STIG Date
Red Hat Enterprise Linux 6 Security Technical Implementation Guide 2020-09-03

Details

Check Text ( C-19549r377219_chk )
The following command will discover and print world-writable directories that are not owned by a system account, given the assumption that only system accounts have a uid lower than 500. Run it once for each local partition [PART]:

# find [PART] -xdev -type d -perm -0002 -uid +499 -print


If there is output, this is a finding.
Fix Text (F-19547r377220_fix)
All directories in local partitions which are world-writable should be owned by root or another system account. If any world-writable directories are not owned by a system account, this should be investigated. Following this, the files should be deleted or assigned to an appropriate group.