GEN005160 - Any X Windows host must write .Xauthority files.

Information

.Xauthority files ensure the user is authorized to access specific X Windows host. If .Xauthority files are not used, it may be possible to obtain unauthorized access to the X Windows host.

Solution

Ensure the X Windows host is configured to write .Xauthority files into user home directories.

Edit the Xaccess file.

Ensure the line writing the .Xauthority file is uncommented.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_5_V2R1_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-2(1)(b), 800-53|CM-6b., CAT|II, CCI|CCI-000297, CCI|CCI-000366, Rule-ID|SV-218570r603259_rule, STIG-ID|GEN005160, STIG-Legacy|SV-63199, STIG-Legacy|V-850, Vuln-ID|V-218570

Plugin: Unix

Control ID: 6b78264920a73fd5c0063869d8f2ad20f53c92780c95cb2eed3ce128a2cbfaf3