Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-975 | GEN002980 | SV-45573r1_rule | Medium |
Description |
---|
A readable and/or writable cron.allow file by users other than root could allow potential intruders and malicious users to use the file contents to help discern information, such as who is allowed to execute cron programs, which could be harmful to overall system and network security. |
STIG | Date |
---|---|
SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide | 2018-09-19 |
Check Text ( C-42923r1_chk ) |
---|
Check mode of the cron.allow file. Procedure: # ls -lL /etc/cron.allow If the file has a mode more permissive than 0600, this is a finding. |
Fix Text (F-38969r1_fix) |
---|
Change the mode of the cron.allow file to 0600. Procedure: # chmod 0600 /etc/cron.allow |