VID |
14105 |
Severity |
40 |
Port |
22 |
Protocol |
TCP |
Class |
LSC |
Detailed Description |
Root is a very important account to manage the system. If direct logins with the root account is allowed, the system can be a attacker's goal, so root account's direct access should be managed. Allowing root account's remote access can provide a better opportunity for the attacker, so root account's remote access should be prohibited.
* Affected platforms: UNIX, Linux |
Recommendation |
Follow the steps below to prohibit root's remote access.
*Solaris 1. Open "/etc/default/login" 2. Edit or insert as follows (Before) #CONSOLE=/dev/console (After) CONSOLE=/dev/console
*Linux 1. Remove pts/0 ~ pts/x from "/etc/securetty" 2. Edit "/etc/pam.d/login" (Before) #auth required /lib/security/pam_securetty.so (After) auth required /lib/security/pam_securetty.so
*AIX 1. Open "/etc/security/user" 2. Edit or insert root's rlogin setting as follows (Before) rlogin = true (After) rlogin = false
*HP 1. Open "/etc/securetty" 2. Edit or insert as follows (Before) #console (After) console |
Related URL |
(CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|