Check: GEN001390
Solaris 10 X86 STIG:
GEN001390
(in versions v2 r4 through v1 r17)
Title
The /etc/passwd file must not have an extended ACL. (Cat II impact)
Discussion
File system ACLs can provide access to files beyond what is allowed by the mode numbers of the files. The /etc/passwd file contains the list of local system accounts. It is vital to system security and must be protected from unauthorized modification.
Check Content
Verify /etc/passwd has no extended ACL. # ls -l /etc/passwd If the permissions include a "+", the file has an extended ACL, this is a finding.
Fix Text
Remove the extended ACL from the file. # chmod A- /etc/passwd
Additional Identifiers
Rule ID: SV-227643r603266_rule
Vulnerability ID: V-227643
Group Title: SRG-OS-000480
Expert Comments
Expert comments are only available to logged-in users.
CCIs
CCIs tied to check.
Number | Definition |
---|---|
CCI-000366 |
The organization implements the security configuration settings. |
Controls
Controls tied to check. These are derived from the CCIs shown above.
Number | Title |
---|---|
CM-6 |
Configuration Settings |