CCE-95663-1Platform: cpe:/o:debian:debian_linux:11.x, cpe:/o:ubuntu:ubuntu_linux:16.04, cpe:/o:ubuntu:ubuntu_linux:18.04, cpe:/o:ubuntu:ubuntu_linux:20.04, cpe:/o:ubuntu:ubuntu_linux:22.04, cpe:/o:ubuntu:ubuntu_linux:23.04 | Date: (C)2021-03-08 (M)2023-09-01 |
While the system administrator can establish secure permissions for users "dot" files, the users can easily override these.
Rationale:
Group or world-writable user configuration files may enable malicious users to steal or modify other user's data or to gain another user's system privileges.
Fix:
Making global modifications to users files without alerting the user community can result in unexpected outages and unhappy users. Therefore, it is recommended that a monitoring policy be established to report user dot files and determine the action to be taken in accordance with site policy.
Parameter:
[yes/no]
Technical Mechanism:
Making global modifications to user s files without alerting the user community can result in unexpected outages and unhappy users. Therefore, it is recommended that a monitoring policy be established to report user dot files and determine the action to be taken in accordance with site policy.
CCSS Severity: | CCSS Metrics: |
CCSS Score : 8.8 | Attack Vector: LOCAL |
Exploit Score: 2.0 | Attack Complexity: LOW |
Impact Score: 6.0 | Privileges Required: LOW |
Severity: HIGH | User Interaction: NONE |
Vector: AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H | Scope: CHANGED |
| Confidentiality: HIGH |
| Integrity: HIGH |
| Availability: HIGH |
| |
References: Resource Id | Reference |
---|
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:87383 |
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:68716 |
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:70796 |
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:92153 |
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:70706 |
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:85240 |