Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-216072 | SOL-11.1-020380 | SV-216072r505929_rule | Medium |
Description |
---|
System start-up files executing programs owned by other than root (or another privileged user) or an application indicates the system may have been compromised. |
STIG | Date |
---|---|
Solaris 11 X86 Security Technical Implementation Guide | 2020-09-03 |
Check Text ( C-17310r372598_chk ) |
---|
Determine the programs executed by system start-up files. Determine the ownership of the executed programs. # cat /etc/rc* /etc/init.d/* | more Check the ownership of every program executed by the system start-up files. # ls -l If any executed program is not owned by root, sys, bin, or in rare cases, an application account, this is a finding. |
Fix Text (F-17308r372599_fix) |
---|
Change the ownership of the file executed from system startup scripts to root, bin, or sys. # chown root |