UCF STIG Viewer Logo

Skeleton files must not have extended ACLs.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22357 GEN001810 SV-26474r1_rule ECLP-1 Medium
Description
If the skeleton files are not protected, unauthorized personnel could change user startup parameters and possibly jeopardize user files.
STIG Date
SOLARIS 9 X86 SECURITY TECHNICAL IMPLEMENTATION GUIDE 2015-10-01

Details

Check Text ( C-27537r1_chk )
Check skeleton files for extended ACLs.
# ls -alL /etc/skel
If the permissions include a "+", the file has an extended ACL and this is a finding.
Fix Text (F-23703r1_fix)
Remove the extended ACL from the file.
# getfacl [skeleton file with extended ACL]
Remove each ACE returned.
# setfacl -d [ACE] [skeleton file with extended ACL]