Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-22394 | GEN003270 | SV-26046r1_rule | ECLP-1 | Medium |
Description |
---|
Cron daemon control files restrict the scheduling of automated tasks and must be protected. Unauthorized modification of the cron.deny file could result in Denial-of-Service to authorized cron users or could provide unauthorized users with the ability to run cron jobs. |
STIG | Date |
---|---|
VMware ESX 3 Server | 2016-05-13 |
Check Text ( C-29229r1_chk ) |
---|
Determine the cron.deny file's group owner. Procedure: # ls -lL cron.deny If the file is not group-owned by root, bin, sys, or cron, this is a finding. |
Fix Text (F-26250r1_fix) |
---|
Change the group owner of the cron.deny file to root, sys, bin, or cron. Procedure: # chown root /var/adm/cron/cron.deny |