Check: GEN005160
Title
Any X Windows host must write .Xauthority files. (Cat II impact)
Discussion
.Xauthority files ensure the user is authorized to access the specific X Windows host. If .Xauthority files are not used, it may be possible to obtain unauthorized access to the X Windows host.
Check Content
Check for .Xauthority files being utilized by looking for such files in the home directory of a user that uses X. Procedure: # find / -name .Xauthority -print -exec ls -la {} \; 2>/dev/null If the .Xauthority file does not exist, ask the SA if the user is using X Windows. If the user is utilizing X Windows and the .Xauthority file does not exist, this is a finding.
Fix Text
Ensure the X Windows host is configured to write .Xauthority files into user home directories. Edit the Xaccess file. Ensure the line that writes the .Xauthority file is uncommented.
Additional Identifiers
Rule ID:
Vulnerability ID: V-850
Group Title:
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000297 |
The organization reviews and updates the baseline configuration of the information system when required due to organization-defined circumstances. |
Controls
Number | Title |
---|---|
CM-2 (1) |
Reviews And Updates |