Korean
<< Back
VID 14105
Severity 40
Port 22
Protocol TCP
Class LSC
Detailed Description Root is a very important account to manage the system. If direct logins with the root account is allowed, the system can be a attacker's goal, so root account's direct access should be managed.
Allowing root account's remote access can provide a better opportunity for the attacker, so root account's remote access should be prohibited.

* Affected platforms:
UNIX, Linux
Recommendation Follow the steps below to prohibit root's remote access.

*Solaris
1. Open "/etc/default/login"
2. Edit or insert as follows
(Before) #CONSOLE=/dev/console
(After) CONSOLE=/dev/console

*Linux
1. Remove pts/0 ~ pts/x from "/etc/securetty"
2. Edit "/etc/pam.d/login"
(Before) #auth required /lib/security/pam_securetty.so
(After) auth required /lib/security/pam_securetty.so

*AIX
1. Open "/etc/security/user"
2. Edit or insert root's rlogin setting as follows
(Before) rlogin = true
(After) rlogin = false

*HP
1. Open "/etc/securetty"
2. Edit or insert as follows
(Before) #console
(After) console
Related URL (CVE)
Related URL (SecurityFocus)
Related URL (ISS)