Check: GEN003000
SUSE Linux Enterprise Server v11 for System z STIG:
GEN003000
(in versions v1 r12 through v1 r9)
Title
Cron must not execute group-writable or world-writable programs. (Cat II impact)
Discussion
If cron executes group-writable or world-writable programs, there is a possibility that unauthorized users could manipulate the programs with malicious intent. This could compromise system and network security.
Check Content
List all cronjobs on the system. Procedure: # ls /var/spool/cron /var/spool/cron/tabs # ls /etc/crontab /etc/cron.{d,daily,hourly,monthly,weekly} or # ls /etc/cron*|grep -v deny If cron jobs exist under any of the above directories, use the following command to search for programs executed by cron: # more <cron job file> Perform a long listing of each program file found in the cron file to determine if the file is group-writable or world-writable. # ls -la <cron program file> If cron executes group-writable or world-writable files, this is a finding.
Fix Text
Remove the world-writable and group-writable permissions from the cron program file(s) identified. # chmod go-w <cron program file>
Additional Identifiers
Rule ID: SV-45576r1_rule
Vulnerability ID: V-976
Group Title: GEN003000
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000225 |
Employ the principle of least privilege, allowing only authorized accesses for users (or processes acting on behalf of users) which are necessary to accomplish assigned organizational tasks. |
Controls
Number | Title |
---|---|
AC-6 |
Least Privilege |