Check: GEN001940
Solaris 10 X86 STIG:
GEN001940
(in versions v2 r4 through v1 r17)
Title
User start-up files must not execute world-writable programs. (Cat II impact)
Discussion
If start-up files execute world-writable programs, especially in unprotected directories, they could be maliciously modified to become Trojans destroying user files or otherwise compromising the system at the user, or higher, level. If the system is compromised at the user level, it is much easier to eventually compromise the system at the root and network level.
Check Content
Check local initialization files for any executed world-writable programs or scripts. Procedure: # find / -perm -002 -type f | egrep -v '^(/proc|/system/contract)' > wwlist # fgrep -f wwlist /<usershomedirectory>/.* If any local initialization file executes a world-writable program or script, this is a finding.
Fix Text
Remove the world-writable permission of files referenced by local initialization scripts, or remove the references to these files in the local initialization scripts.
Additional Identifiers
Rule ID: SV-227685r603266_rule
Vulnerability ID: V-227685
Group Title: SRG-OS-000480
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000366 |
The organization implements the security configuration settings. |
Controls
Number | Title |
---|---|
CM-6 |
Configuration Settings |