[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CCE
view XML

CCE-91222-0

Platform: cpe:/o:ubuntu:ubuntu_linux:14.04Date: (C)2017-03-14   (M)2023-07-04



Set User/Group Owner and Permission on /etc/cron.daily (Scored) The /etc/cron.daily directory contains system cron jobs that need to run on a daily basis. The files in this directory cannot be manipulated by the crontab command, but are instead edited by system administrators using a text editor. The commands below restrict read/write and search access to user and group root, preventing regular users from accessing this directory.


Parameter:

[root user owns, root group owns, permission 700]


Technical Mechanism:

Granting write access to this directory for non-privileged users could provide them the means for gaining unauthorized elevated privileges. Granting read access to this directory could give an unprivileged user insight in how to gain elevated privileges or circumvent auditing controls. Fix: # chown root:root /etc/cron.daily # chmod og-rwx /etc/cron.daily

CCSS Severity:CCSS Metrics:
CCSS Score : 6.8Attack Vector: LOCAL
Exploit Score: 2.5Attack Complexity: LOW
Impact Score: 4.2Privileges Required: NONE
Severity: MEDIUMUser Interaction: NONE
Vector: AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:HScope: UNCHANGED
 Confidentiality: NONE
 Integrity: LOW
 Availability: HIGH
  

References:
Resource IdReference
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:33920


OVAL    1
oval:org.secpod.oval:def:33920
XCCDF    1
xccdf_org.secpod_benchmark_general_Ubuntu_14_04

© SecPod Technologies