Check: RHEL-06-000337
Red Hat Enterprise Linux 6 STIG:
RHEL-06-000337
(in versions v2 r2 through v1 r14)
Title
All public directories must be owned by a system account. (Cat III impact)
Discussion
Allowing a user account to own a world-writable directory is undesirable because it allows the owner of that directory to remove or replace any files that may be placed in the directory by other users.
Check Content
The following command will discover and print world-writable directories that are not owned by a system account, given the assumption that only system accounts have a uid lower than 500. Run it once for each local partition [PART]: # find [PART] -xdev -type d -perm -0002 -uid +499 -print If there is output, this is a finding.
Fix Text
All directories in local partitions which are world-writable should be owned by root or another system account. If any world-writable directories are not owned by a system account, this should be investigated. Following this, the files should be deleted or assigned to an appropriate group.
Additional Identifiers
Rule ID: SV-218068r603264_rule
Vulnerability ID: V-218068
Group Title: SRG-OS-000480
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000366 |
The organization implements the security configuration settings. |
Controls
Number | Title |
---|---|
CM-6 |
Configuration Settings |