GEN003300 - The at.deny file must not be empty if it exists.

Information

On some systems, if there is no at.allow file and there is an empty at.deny file, then the system assumes everyone has permission to use the at facility. This could create an insecure setting in the case of malicious users or system intruders.

Solution

Add appropriate users to the at.deny file, or remove the empty at.deny file if an at.allow file exists.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_10_SPARC_V2R4_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-226861r603265_rule, STIG-ID|GEN003300, STIG-Legacy|SV-27380, STIG-Legacy|V-985, Vuln-ID|V-226861

Plugin: Unix

Control ID: de0d93db41dfea1db411a37355c1031b1125a59731335bb26d59eaece85c3441