Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-22446 | GEN005190 | SV-37682r1_rule | ECLP-1 | Medium |
Description |
---|
.Xauthority files ensure the user is authorized to access specific X Windows host. Extended ACLs may permit unauthorized modification of these files, which could lead to Denial of Service to authorized access or allow unauthorized access to be obtained. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 5 Security Technical Implementation Guide | 2013-04-10 |
Check Text ( C-36869r2_chk ) |
---|
Check the file permissions for the .Xauthority files. These files will be located in user home directories. Procedure: # ls -la ~username |egrep "(\.Xauthority|\.xauth)" If the permissions include a '+', the file has an extended ACL. If the file has an extended ACL and it has not been documented with the IAO, this is a finding. |
Fix Text (F-31834r1_fix) |
---|
Remove the extended ACL from the file. # setfacl --remove-all .Xauthority |