GEN000000-LNX00600 - PAM system must not grant sole access to admin privileges to the first user who logs into the console.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

If an unauthorized user has been granted privileged access while logged in at the console, the security posture of a system could be greatly compromised. Additionally, such a situation could deny legitimate root access from another terminal.

Solution

Configure PAM to not grant sole access of administrative privileges to the first user logged in at the console.

Identify any instances of pam_console.

# cd /etc/pam.d
# grep pam_console.so *

For any files containing an un-commented reference to pam_console.so, edit the file and remove or comment out the reference.

Remove the console.perms file if it exists:
# rm /etc/security/console.perms

See Also

http://iasecontent.disa.mil/stigs/zip/U_RedHat_5_V1R17_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000225, CCI|CCI-000366, Group-ID|V-4346, Rule-ID|SV-37339r1_rule, STIG-ID|GEN000000-LNX00600

Plugin: Unix

Control ID: 19b79e76908ed480018383a45946913e0e91729a206a6e93e2fb74c25aa2d72c