System start-up files must only execute programs owned by a privileged UID or an application.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-216072 | SOL-11.1-020380 | SV-216072r959010_rule | Medium |
| Description |
| System start-up files executing programs owned by other than root (or another privileged user) or an application indicates the system may have been compromised. |
| STIG | Date |
| Solaris 11 X86 Security Technical Implementation Guide | 2025-05-05 |
Details
| Check Text (C-17310r372598_chk) |
| Determine the programs executed by system start-up files. Determine the ownership of the executed programs. # cat /etc/rc* /etc/init.d/* | more Check the ownership of every program executed by the system start-up files. # ls -l <executed program> If any executed program is not owned by root, sys, bin, or in rare cases, an application account, this is a finding. |
| Fix Text (F-17308r372599_fix) |
| Change the ownership of the file executed from system startup scripts to root, bin, or sys. # chown root <executed file> |