UCF STIG Viewer Logo

System start-up files must only execute programs owned by a privileged UID or an application.


Overview

Finding ID Version Rule ID IA Controls Severity
V-4091 GEN001700 SV-4091r2_rule DCSL-1 Medium
Description
System start-up files that execute programs owned by other than root (or another privileged user) or an application indicates the system may have been compromised.
STIG Date
UNIX SRG 2013-03-26

Details

Check Text ( C-28190r1_chk )
Check the ownership of any files executed from system startup scripts. If any of these files are not owned by root, bin, sys, or other, this is a finding.
Fix Text (F-24458r1_fix)
Change the ownership of the file executed from system startup scripts to root, bin, sys, or other.
# chown root