The AIX /var/spool/cron/atjobs directory must be owned by root or bin. (Cat II impact)
Unauthorized ownership of the /var/spool/cron/atjobs directory could permit unauthorized users the ability to alter atjobs and run automated jobs as privileged users. Failure to set proper permissions of the /var/spool/cron/atjobs directory provides unauthorized users with the potential to access sensitive information or change the system configuration which could weaken the system's security posture.
Check the ownership of the /var/spool/cron/atjobs directory using command: # ls -ld /var/spool/cron/atjobs The above command should yield the following output: drw-r----- 1 bin cron 993 Mar 11 07:04 /var/spool/cron/atjobs If the owner of the "atjobs" directory is not "root" or "bin", this is a finding.
Change the ownership of the "atjobs" directory to bin using command: # chown bin /var/spool/cron/atjobs
Rule ID: SV-245566r832900_rule
Vulnerability ID: V-245566
Group Title: SRG-OS-000480-GPOS-00227
The organization implements the security configuration settings.