UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The cron.deny file must be group-owned by root, bin, sys, or cron.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22394 GEN003270 SV-26046r1_rule ECLP-1 Medium
Description
Cron daemon control files restrict the scheduling of automated tasks and must be protected. Unauthorized modification of the cron.deny file could result in Denial-of-Service to authorized cron users or could provide unauthorized users with the ability to run cron jobs.
STIG Date
VMware ESX 3 Server 2016-05-13

Details

Check Text ( C-29229r1_chk )
Determine the cron.deny file's group owner.

Procedure:
# ls -lL cron.deny

If the file is not group-owned by root, bin, sys, or cron, this is a finding.
Fix Text (F-26250r1_fix)
Change the group owner of the cron.deny file to root, sys, bin, or cron.

Procedure:
# chown root /var/adm/cron/cron.deny