SOL-11.1-070010 - The sticky bit must be set on all world writable directories.

Information

Files in directories that have had the 'sticky bit' enabled can only be deleted by users that have both write permissions for the directory in which the file resides, as well as ownership of the file or directory, or have sufficient privileges. As this prevents users from overwriting each others' files, whether it be accidental or malicious, it is generally appropriate for most world-writable directories (e.g., /tmp).

Solution

The root role is required.

Ensure that the 'sticky bit' is set on any directories identified during the check steps.

# chmod +t [directory name]

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_11_x86_V3R1_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-216180r959010_rule, STIG-ID|SOL-11.1-070010, STIG-Legacy|SV-61009, STIG-Legacy|V-48137, Vuln-ID|V-216180

Plugin: Unix

Control ID: 95519af84298504d0e3ce10a1f7f5c00361e45aedeeca46553080720d9c4e889