UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The root account must be the only account having a UID of 0.


Overview

Finding ID Version Rule ID IA Controls Severity
V-773 GEN000880 SV-44900r1_rule IAIA-1 ECLP-1 IAIA-2 Medium
Description
If an account has a UID of 0, it has root authority. Multiple accounts with a UID of 0 afford more opportunity for potential intruders to guess a password for a privileged account.
STIG Date
SUSE Linux Enterprise Server v11 for System z 2015-10-20

Details

Check Text ( C-42340r1_chk )
Check the system for duplicate UID 0 assignments by listing all accounts assigned UID 0.

Procedure:
# cat /etc/passwd | awk -F":" '{print$1":"$3":"}' | grep ":0:"

If any accounts other than root are assigned UID 0, this is a finding.
Fix Text (F-38332r1_fix)
Remove or change the UID of accounts other than root that have UID 0.