Check: GEN001475
Solaris 9 X86 STIG:
GEN001475
(in version v1 r9)
Title
The /etc/group file must not contain any group password hashes. (Cat II impact)
Discussion
Group passwords are typically shared and should not be used. Additionally, if password hashes are readable by non-administrators, the passwords are subject to attack through lookup tables or cryptographic weaknesses in the hashes.
Check Content
Check the /etc/group file for password hashes. Procedure: # cut -d : -f 2 /etc/group | egrep -v '^(x|!)$' If any password hashes are returned, this is a finding. If no password hashes are returned, there is no finding.
Fix Text
Edit /etc/group and change the password field to an exclamation point (!) to lock the group password.
Additional Identifiers
Rule ID: SV-26447r1_rule
Vulnerability ID: V-22348
Group Title:
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000225 |
The organization employs the concept of least privilege, allowing only authorized accesses for users (and processes acting on behalf of users) which are necessary to accomplish assigned tasks in accordance with organizational missions and business functions. |
Controls
Number | Title |
---|---|
AC-6 |
Least Privilege |