UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The root account must be the only account with GID of 0.


Overview

Finding ID Version Rule ID IA Controls Severity
V-12033 GEN000000-SOL00440 SV-12534r2_rule IAIA-1 IAIA-2 High
Description
Accounts with a GID of 0 have root group privileges.
STIG Date
Solaris 10 X86 Security Technical Implementation Guide 2014-04-04

Details

Check Text ( C-7997r2_chk )
Check passwd and group files for non-root user ids and group ids with a GID of 0.

# more /etc/passwd
# more /etc/group

OR

# awk -F: '$4 == 0' /etc/passwd
# awk -F: '$3 == 0' /etc/group

Confirm the only account with a group id of 0 is root.

If the root account is not the only account with GID of 0, this is a finding.
Fix Text (F-11290r2_fix)
Change the default GID of non-root accounts to a valid GID other than 0.