Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-4427 | GEN002020 | SV-40331r1_rule | ECCD-1 ECCD-2 | Medium |
Description |
---|
If these files are not properly configured, they could allow malicious access by unknown malicious users from untrusted hosts who could compromise the system. |
STIG | Date |
---|---|
SOLARIS 10 X86 SECURITY TECHNICAL IMPLEMENTATION GUIDE | 2017-12-18 |
Check Text ( C-39209r1_chk ) |
---|
Locate and examine all .rhosts, .shosts, hosts.equiv, and shosts.equiv files. The .rhosts and .shosts files are stored in home directories. (If a user does not have a home directory assigned in /etc/passwd, the root directory (/) is assigned as a default home directory.) Procedure: # for i in `cut -d: -f6 /etc/passwd | awk '$1 == "" {$1 = "/"} {print $1}'`; do more $i/.rhosts; more $i/.shosts; done # more /etc/hosts.equiv # more /etc/ssh/shosts.equiv If any .rhosts, .shosts, hosts.equiv, or shosts.equiv file contains other than host-user pairs, this is a finding. |
Fix Text (F-4326r2_fix) |
---|
If possible, remove the .rhosts, .shosts, hosts.equiv, and shosts.equiv files. If the files are required, remove any content from the files except for necessary host-user pairs. |