Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-850 | GEN005160 | SV-850r2_rule | ECCD-1 ECCD-2 | Medium |
Description |
---|
.Xauthority files ensure the user is authorized to access the specific X Windows host. If .Xauthority files are not used, it may be possible to obtain unauthorized access to the X Windows host. |
STIG | Date |
---|---|
Solaris 9 X86 Security Technical Implementation Guide | 2012-05-25 |
Check Text ( C-718r2_chk ) |
---|
Check for .Xauthority files being utilized by looking for such files in the home directory of a user that uses X. Procedure: # cd ~someuser # ls -la .Xauthority If the .Xauthority file does not exist, ask the SA if the user is using X Windows. If the user is utilizing X Windows and the .Xauthority file does not exist, this is a finding. |
Fix Text (F-1004r2_fix) |
---|
Ensure the X Windows host is configured to write .Xauthority files into user home directories. Edit the Xaccess file. Ensure the line that writes the .Xauthority file is uncommented. |