Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-22384 | GEN002990 | SV-26527r1_rule | ECLP-1 | Medium |
Description |
---|
A cron.allow file readable and/or writable by other than root could allow potential intruders and malicious users to use the file contents to help discern information, such as who is allowed to execute cron programs, which could be harmful to overall system and network security. |
STIG | Date |
---|---|
Solaris 9 SPARC Security Technical Implementation Guide | 2012-05-25 |
Check Text ( C-27579r1_chk ) |
---|
Check the permissions of the cron.allow file. # ls -l /etc/cron.allow If the permissions include a "+", the file has an extended ACL and this is a finding. |
Fix Text (F-23769r1_fix) |
---|
Remove the extended ACL from the file. # getfacl /etc/cron.allow Remove each ACE returned. # setfacl -d [ACE] /etc/cron.allow |