GEN005220 - .Xauthority or X*.hosts (or equivalent) file(s) must be used to restrict access to the X server.

Information

If access to the X server is not restricted, a user's X session may be compromised.

Solution

Create an X*.hosts file, where '*' is a display number used to limit X window connections. Add the list of authorized X clients to the file.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_5_V2R1_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-2(1)(b), 800-53|CM-6b., CAT|II, CCI|CCI-000297, CCI|CCI-000366, Rule-ID|SV-218574r603259_rule, STIG-ID|GEN005220, STIG-Legacy|SV-63313, STIG-Legacy|V-12016, Vuln-ID|V-218574

Plugin: Unix

Control ID: 3e3a7982f2ede6f313762ada260f596695a539377f1bf0590a04d28e818476c5