GEN001700 - System start-up files must only execute programs owned by a privileged UID or an application.

Information

System start-up files executing programs owned by other than root (or another privileged user) or an application indicating the system may have been compromised.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Change the ownership of the file executed from system startup scripts to root, bin, sys, or other.
# chown root <executed file>

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_5_V2R1_STIG.zip

Item Details

Category: ACCESS CONTROL, CONFIGURATION MANAGEMENT

References: 800-53|AC-6, 800-53|CM-5(6), CAT|II, CCI|CCI-000225, CCI|CCI-001499, Rule-ID|SV-218324r603259_rule, STIG-ID|GEN001700, STIG-Legacy|SV-63861, STIG-Legacy|V-4091, Vuln-ID|V-218324

Plugin: Unix

Control ID: 69940dfc7fb6ebeaf990f543fd2db836f8e3b237a5d13b7b8f6429ab13099ec0