VID |
14079 |
Severity |
30 |
Port |
22 |
Protocol |
TCP |
Class |
LSC |
Detailed Description |
The host system's /etc/cron.d/at.deny file's permission or owner is unsafe. at file is usually used for tasks that are executed automatically under single system. generally attackers leave backdoor file on the files which are executed by at or cron command. therefore these files must not have write permission. the list of accounts which are not allowed to run at command are saved in at.deny file.
* The vulnerability checks a path of the file specified in the ministry of security and public administration notify in supplement of 2012-54. If the file exists in other route, it might be a false positive.
* Platforms Affected: UNIX, Linux |
Recommendation |
Reset permissions of the file lower than 640 as the following chmod 640 /etc/cron.d/at.deny(/etc/at.deny)
if the owner of the file is not root, change the owner chown root /etc/cron.d/at.deny(/etc/at.deny) |
Related URL |
(CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|