System start-up files must only execute programs owned by a privileged UID or an application.

Overview

Finding IDVersionRule IDIA ControlsSeverity
V-216072SOL-11.1-020380SV-216072r959010_ruleCCI-000366medium
Description
System start-up files executing programs owned by other than root (or another privileged user) or an application indicates the system may have been compromised.
STIGDate
Solaris 11 X86 Security Technical Implementation Guide2025-05-05

Details

Check Text (C-216072r959010_chk)

Determine the programs executed by system start-up files. Determine the ownership of the executed programs. # cat /etc/rc* /etc/init.d/* | more Check the ownership of every program executed by the system start-up files. # ls -l <executed program> If any executed program is not owned by root, sys, bin, or in rare cases, an application account, this is a finding.

Fix Text (F-17308r372599_fix)

Change the ownership of the file executed from system startup scripts to root, bin, or sys. # chown root <executed file>