GEN001700 - System start-up files must only execute programs owned by a privileged UID or an application

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

System start-up files that execute programs owned by other than root (or another privileged user) or an application indicate that the system may have been compromised.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Change the ownership of the file executed from system startup scripts to root, bin, sys, or the application account, where required.
# chown root <executed file>

See Also

https://iasecontent.disa.mil/stigs/zip/U_HPUX_11-31_V1R19_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000225, Rule-ID|SV-38422r1_rule, STIG-ID|GEN001700, Vuln-ID|V-4091

Plugin: Unix

Control ID: 59ab8fd3a4ec86bb6c6635a4863afa659232146b52955d24d052d22ff50ee87e