GEN005220 - .Xauthority or X*.hosts (or equivalent) file(s) must be used to restrict access to the X server.

Information

If access to the X server is not restricted, a user's X session may be compromised.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Create an X*.hosts file, where * is a display number that may be used to limit X window connections. Add the list of authorized X clients to the file.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_10_x86_V2R4_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-227872r603266_rule, STIG-ID|GEN005220, STIG-Legacy|SV-12517, STIG-Legacy|V-12016, Vuln-ID|V-227872

Plugin: Unix

Control ID: 40be28fae20a05136a5605164ff14e4af0b1e721eaac5f2750deddf1a10e921d