Check: GEN003420
AIX 6.1 SECURITY TECHNICAL IMPLEMENTATION GUIDE:
GEN003420
(in versions v1 r14 through v1 r10)
Title
The at directory must be owned by root, bin, sys, daemon, or cron. (Cat II impact)
Discussion
If the owner of the at directory is not root, bin, sys, daemon, or cron unauthorized users could be allowed to view or edit files containing sensitive information within the directory.
Check Content
Check the ownership of the at directory. Procedure: # ls -ld /var/spool/cron/atjobs If the directory is not owned by root, bin, sys, daemon, or cron, this is a finding.
Fix Text
Change the owner of the at directory to root, bin, sys, daemon, or cron. Procedure: # chown bin /var/spool/cron/atjobs
Additional Identifiers
Rule ID: SV-39350r1_rule
Vulnerability ID: V-4365
Group Title: GEN003420
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000225 |
Employ the principle of least privilege, allowing only authorized accesses for users (or processes acting on behalf of users) which are necessary to accomplish assigned organizational tasks. |
Controls
Number | Title |
---|---|
AC-6 |
Least Privilege |