OL6-00-000282 - There must be no world-writable files on the system.

Information

Data in world-writable files can be modified by any user on the system. In almost all circumstances, files can be configured using a combination of user and group permissions to support whatever legitimate access is needed without the risk caused by world-writable files.

Solution

It is generally a good idea to remove global (other) write access to a file when it is discovered. However, check with documentation for specific applications before making changes. Also, monitor for recurring world-writable files, as these may be symptoms of a misconfigured application or user account.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_6_V2R7_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-209018r793739_rule, STIG-ID|OL6-00-000282, STIG-Legacy|SV-65077, STIG-Legacy|V-50871, Vuln-ID|V-209018

Plugin: Unix

Control ID: d4378576d7fa832f31c0299cf2bb19b86884c6e9ce2a65b9044156008d01d37a