GEN001700 - System start-up files must only execute programs owned by a privileged UID or an application.

Information

System start-up files executing programs owned by other than root (or another privileged user) or an application indicate the system may have been compromised.
NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Change the ownership of the file executed from system startup scripts to root, bin, sys, or other.
# chown root <executed file>

See Also

http://iasecontent.disa.mil/stigs/zip/U_STIG_Library_2015_07.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-6, CAT|II, CCI|CCI-000225, Rule-ID|SV-27221r1_rule, STIG-ID|GEN001700, Vuln-ID|V-4091

Plugin: Unix

Control ID: fcacf038410daa327b69a9f040be2114eebda90edc7b4da1ebadea1dc4fad1ff