STIGQter STIGQter: STIG Summary: Solaris 10 X86 Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 22 Jan 2021:

The root account must not have world-writable directories in its executable search path.

DISA Rule

SV-220079r603266_rule

Vulnerability Number

V-220079

Group Title

SRG-OS-000480

Rule Version

GEN000960

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

For each world-writable path in root's executable search path, perform one of the following.

1. Remove the world-writable permission on the directory.
Procedure:
# chmod o-w <path>

2. Remove the world-writable directory from the executable search path.

Procedure:
Identify and edit the initialization file referencing the world-writable directory and remove it from the PATH variable.

Check Contents

Check for world-writable permissions on all directories in the root user's executable search path. Procedure (on multiple lines):

# echo $PATH | sed 's/ /\\ /g; s/:/
/g' | xargs ls -ld

If any of the directories in the PATH variable are world-writable, this is a finding.

Vulnerability Number

V-220079

Documentable

False

Rule Version

GEN000960

Severity Override Guidance

Check for world-writable permissions on all directories in the root user's executable search path. Procedure (on multiple lines):

# echo $PATH | sed 's/ /\\ /g; s/:/
/g' | xargs ls -ld

If any of the directories in the PATH variable are world-writable, this is a finding.

Check Content Reference

M

Target Key

4061

Comments