CCE-92965-3Platform: cpe:/o:ubuntu:ubuntu_linux:19.04 | Date: (C)2019-11-07 (M)2023-07-04 |
Verify Permissions on /etc/hosts.deny
The /etc/hosts.deny file contains network information that is used by many system applications and therefore must be readable for these applications to operate.
Parameter:
[permission 644]
Technical Mechanism:
It is critical to ensure that the /etc/hosts.deny file is protected from unauthorized write access. Although it is protected by default, the file permissions could be changed either inadvertently or through malicious actions.
Fix:
If the permissions of the /etc/hosts.deny file are incorrect, run the following command to correct them:
# /bin/chmod 644 /etc/hosts.deny
CCSS Severity: | CCSS Metrics: |
CCSS Score : 9.2 | Attack Vector: LOCAL |
Exploit Score: 2.5 | Attack Complexity: LOW |
Impact Score: 6.0 | Privileges Required: NONE |
Severity: CRITICAL | User Interaction: NONE |
Vector: AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H | Scope: CHANGED |
| Confidentiality: LOW |
| Integrity: HIGH |
| Availability: HIGH |
| |
References: Resource Id | Reference |
---|
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:55178 |