GEN001700 - System start-up files must only execute programs owned by a privileged UID or an application

Information

System start-up files that execute programs owned by other than root (or another privileged user) or an application indicate that the system may have been compromised.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Change the ownership of the file executed from system startup scripts to root, bin, sys, or the application account, where required.
# chown root <executed file>

See Also

https://iasecontent.disa.mil/stigs/zip/U_HPUX_11-31_V1R19_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000225, Rule-ID|SV-38422r1_rule, STIG-ID|GEN001700, Vuln-ID|V-4091

Plugin: Unix

Control ID: 59ab8fd3a4ec86bb6c6635a4863afa659232146b52955d24d052d22ff50ee87e