STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide

V-988

CAT II (Medium)

The at daemon must not execute group-writable or world-writable programs.

Rule ID

SV-45668r1_rule

STIG

SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide

Version

V1R12

CCIs

CCI-000225

Discussion

If the "at" facility executes world-writable or group-writable programs, it is possible for the programs to be accidentally or maliciously changed or replaced without the owner's intent or knowledge. This would cause a system security breach.

Check Content

List the "at" jobs on the system.

Procedure:
# ls -la /var/spool/at /var/spool/atjobs

For each "at" job file, determine which programs are executed.

Procedure:
# more <at job file>

Check the each program executed by "at" for group- or world-writable permissions.
Procedure:
# ls -la <at program file>

If "at" executes group or world-writable programs, this is a finding.

Fix Text

Remove group-write and world-write permissions from files executed by at jobs.

Procedure:
# chmod go-w <file>