Documents for permissions

The owner of the indicated file is not correct. This is a serious security

Code [perm001a]

The owner of the indicated file is not correct. This is a serious security












Code [perm001f]

The owner of the indicated file is not correct. This is a serious security The owner of the indicated file is not correct. This is a serious security The owner of the indicated file is not correct. This is a serious security problem and may indicate that an intrusion has occurred. The system should The owner of the indicated file is not correct. This is a serious security

problem and may indicate that an intrusion has occurred. The system should









The owner of the indicated file is not correct. This is a serious security


problem and may indicate that an intrusion has occurred. The system should be checked and cleaned. The owner of the file should be corrected. The owner of the indicated file is not correct. This is a serious security











The owner of the indicated file is not correct. This is a serious security The owner of the indicated file is not correct. This is a serious security The owner of the indicated file is not correct. This is a serious security problem and may indicate that an intrusion has occurred. The system should

Code [perm001f]

Code [perm001a]

problem and may indicate that an intrusion has occurred. The system should The owner of the indicated file is not correct. This is a serious security problem and may indicate that an intrusion has occurred. The system should problem and may indicate that an intrusion has occurred. The system should The owner of the indicated file is not correct. With the incorrect ownership,

Code [perm001a]

Code [perm001a]

problem and may indicate that an intrusion has occurred. The system should problem and may indicate that an intrusion has occurred. The system should be checked and cleaned. The owner of the file should be corrected.

Code [perm001f]

problem and may indicate that an intrusion has occurred. The system should

Code [perm001a]

Code [perm001f]

Code [perm001a]

problem and may indicate that an intrusion has occurred. The system should










Code [perm001a]


problem and may indicate that an intrusion has occurred. The system should be checked and cleaned. The owner of the file should be corrected. be checked and cleaned. The owner of the file should be corrected.

Code [perm001a]

Code [perm001a]

problem and may indicate that an intrusion has occurred. The system should problem and may indicate that an intrusion has occurred. The system should

Code [perm001a]

Code [perm001a]

Code [perm001a]

Code [perm001a]

problem and may indicate that an intrusion has occurred. The system should

Code [perm001a]

be checked and cleaned. The owner of the file should be corrected. The owner of the indicated file is not correct. With the incorrect ownership, The owner of the indicated file is not correct. This is a serious security be checked and cleaned. The owner of the file should be corrected. be checked and cleaned. The owner of the file should be corrected. problem and may indicate that an intrusion has occurred. The system should be checked and cleaned. The owner of the file should be corrected. a vulnerability may exist. The owner of the file should be corrected. The owner of the indicated file is not correct. This is a serious security The owner of the indicated file is not correct. This is a serious security be checked and cleaned. The owner of the file should be corrected.



The owner of the indicated file is not correct. With the incorrect ownership,

be checked and cleaned. The owner of the file should be corrected.








Code [perm001f]

be checked and cleaned. The owner of the file should be corrected. The owner of the indicated file is not correct. This is a serious security be checked and cleaned. The owner of the file should be corrected. The owner of the indicated file is not correct. This is a serious security The owner of the indicated file is not correct. This is a serious security












be checked and cleaned. The owner of the file should be corrected. The owner of the indicated file is not correct. With the incorrect ownership, The owner of the indicated file is not correct. This is a serious security











Code [perm001a]

The owner of the indicated file is not correct. This is a serious security be checked and cleaned. The owner of the file should be corrected. be checked and cleaned. The owner of the file should be corrected. The owner of the indicated file is not correct. This is a serious security The owner of the indicated file is not correct. This is a serious security The owner of the indicated file is not correct. This is a serious security be checked and cleaned. The owner of the file should be corrected. The owner of the indicated file is not correct. This is a serious security The owner of the indicated file is not correct. This is a serious security












problem and may indicate that an intrusion has occurred. The system should a vulnerability may exist. The owner of the file should be corrected.






















be checked and cleaned. The owner of the file should be corrected.











problem and may indicate that an intrusion has occurred. The system should

Code [perm001f]
















a vulnerability may exist. The owner of the file should be corrected.







problem and may indicate that an intrusion has occurred. The system should The owner of the indicated file is not correct. With the incorrect ownership,











problem and may indicate that an intrusion has occurred. The system should











Code [perm001f]

Code [perm001f]

problem and may indicate that an intrusion has occurred. The system should












The owner of the indicated file is not correct. This is a serious security problem and may indicate that an intrusion has occurred. The system should











a vulnerability may exist. The owner of the file should be corrected. problem and may indicate that an intrusion has occurred. The system should











problem and may indicate that an intrusion has occurred. The system should











problem and may indicate that an intrusion has occurred. The system should



Code [perm001f]

problem and may indicate that an intrusion has occurred. The system should problem and may indicate that an intrusion has occurred. The system should


problem and may indicate that an intrusion has occurred. The system should problem and may indicate that an intrusion has occurred. The system should

Code [perm001f]












be checked and cleaned. The owner of the file should be corrected.

Code [perm001f]

Code [perm001f]












Code [perm001w]

be checked and cleaned. The owner of the file should be corrected.

Code [perm001f]

The owner of the indicated file is not correct. With the incorrect ownership,

Code [perm001f]

a vulnerability may exist. The owner of the file should be corrected.

Code [perm001f]

be checked and cleaned. The owner of the file should be corrected.











be checked and cleaned. The owner of the file should be corrected.

Code [perm001f]

Code [perm001f]

The owner of the indicated file is not correct. With the incorrect ownership, The owner of the indicated file is not correct. With the incorrect ownership, be checked and cleaned. The owner of the file should be corrected.

Code [perm001f]

be checked and cleaned. The owner of the file should be corrected. be checked and cleaned. The owner of the file should be corrected. problem and may indicate that an intrusion has occurred. The system should

Code [perm001f]












Code [perm001f]

be checked and cleaned. The owner of the file should be corrected. be checked and cleaned. The owner of the file should be corrected.

Code [perm001w]

The owner of the indicated file is not correct. With the incorrect ownership, be checked and cleaned. The owner of the file should be corrected. be checked and cleaned. The owner of the file should be corrected. be checked and cleaned. The owner of the file should be corrected. The owner of the indicated file is not correct. With the incorrect ownership, be checked and cleaned. The owner of the file should be corrected.

Code [perm001f]












The owner of the indicated file is not correct. With the incorrect ownership, The owner of the indicated file is not correct. With the incorrect ownership,











The owner of the indicated file is not what is considered best for security The owner of the indicated file is not correct. With the incorrect ownership, a vulnerability may exist. The owner of the file should be corrected.

Code [perm001w]

The owner of the indicated file is not correct. With the incorrect ownership, The owner of the indicated file is not correct. With the incorrect ownership,












The owner of the indicated file is not correct. With the incorrect ownership, The owner of the indicated file is not correct. With the incorrect ownership,

































The owner of the indicated file is not correct. With the incorrect ownership,

Code [perm001w]

a vulnerability may exist. The owner of the file should be corrected. The owner of the indicated file is not correct. With the incorrect ownership, be checked and cleaned. The owner of the file should be corrected.








a vulnerability may exist. The owner of the file should be corrected.















The owner of the indicated file is not correct. With the incorrect ownership,






















a vulnerability may exist. The owner of the file should be corrected.





The owner of the indicated file is not what is considered best for security










a vulnerability may exist. The owner of the file should be corrected.

















The owner of the indicated file is not correct. With the incorrect ownership,

Code [perm001f]

Code [perm001f]

a vulnerability may exist. The owner of the file should be corrected. a vulnerability may exist. The owner of the file should be corrected. a vulnerability may exist. The owner of the file should be corrected.












a vulnerability may exist. The owner of the file should be corrected.

Code [perm001w]

reasons. Unless you have a specific reason for not changing the ownership, The owner of the indicated file is not what is considered best for security a vulnerability may exist. The owner of the file should be corrected.

Code [perm001f]

Code [perm001f]

Code [perm001f]

a vulnerability may exist. The owner of the file should be corrected.

Code [perm001f]

a vulnerability may exist. The owner of the file should be corrected. The owner of the indicated file is not what is considered best for security

Code [perm001f]













a vulnerability may exist. The owner of the file should be corrected.

Code [perm001f]

a vulnerability may exist. The owner of the file should be corrected.












a vulnerability may exist. The owner of the file should be corrected.

Code [perm001f]

Code [perm001f]

Code [perm001f]

Code [perm001f]

reasons. Unless you have a specific reason for not changing the ownership,








Code [perm001f]
























The owner of the indicated file is not correct. With the incorrect ownership, The owner of the indicated file is not correct. With the incorrect ownership, a vulnerability may exist. The owner of the file should be corrected.











Code [perm001w]












The owner of the indicated file is not what is considered best for security










reasons. Unless you have a specific reason for not changing the ownership,





this should be corrected.







The owner of the indicated file is not correct. With the incorrect ownership, The owner of the indicated file is not correct. With the incorrect ownership,


















Code [perm001w]

The owner of the indicated file is not correct. With the incorrect ownership,

Code [perm001f]

The owner of the indicated file is not correct. With the incorrect ownership,

Code [perm001w]

The owner of the indicated file is not correct. With the incorrect ownership, reasons. Unless you have a specific reason for not changing the ownership, The owner of the indicated file is not correct. With the incorrect ownership,


























The owner of the indicated file is not correct. With the incorrect ownership,

Code [perm001w]

The owner of the indicated file is not correct. With the incorrect ownership, The owner of the indicated file is not correct. With the incorrect ownership, The owner of the indicated file is not correct. With the incorrect ownership,

Code [perm001w]

Code [perm001w]

this should be corrected.

Code [perm001w]

The owner of the indicated file is not correct. With the incorrect ownership, a vulnerability may exist. The owner of the file should be corrected.

Code [perm001w]

a vulnerability may exist. The owner of the file should be corrected.












The owner of the indicated file is not what is considered best for security

Code [perm001w]

Code [perm001w]

this should be corrected.












a vulnerability may exist. The owner of the file should be corrected. reasons. Unless you have a specific reason for not changing the ownership,

Code [perm001w]

Code [perm001w]

a vulnerability may exist. The owner of the file should be corrected. The owner of the indicated file is not what is considered best for security

Code [perm001w]

a vulnerability may exist. The owner of the file should be corrected. The owner of the indicated file is not correct. With the incorrect ownership,

Code [perm001w]

a vulnerability may exist. The owner of the file should be corrected.

Code [perm001w]

a vulnerability may exist. The owner of the file should be corrected. The owner of the indicated file is not what is considered best for security this should be corrected. a vulnerability may exist. The owner of the file should be corrected. The owner of the indicated file is not what is considered best for security a vulnerability may exist. The owner of the file should be corrected. a vulnerability may exist. The owner of the file should be corrected. The owner of the indicated file is not what is considered best for security a vulnerability may exist. The owner of the file should be corrected.











a vulnerability may exist. The owner of the file should be corrected.

The owner of the indicated file is not what is considered best for security The owner of the indicated file is not what is considered best for security

Code [perm001w]

a vulnerability may exist. The owner of the file should be corrected. The owner of the indicated file is not what is considered best for security
















reasons. Unless you have a specific reason for not changing the ownership,

Code [perm002a]

The owner of the indicated file is not what is considered best for security


The owner of the indicated file is not what is considered best for security The owner of the indicated file is not what is considered best for security




The owner of the indicated file is not what is considered best for security


















this should be corrected. reasons. Unless you have a specific reason for not changing the ownership,













The owner of the indicated file is not what is considered best for security

The owner of the indicated file is not what is considered best for security






















reasons. Unless you have a specific reason for not changing the ownership, The owner of the indicated file is not what is considered best for security a vulnerability may exist. The owner of the file should be corrected.






























Code [perm002a]

reasons. Unless you have a specific reason for not changing the ownership,













reasons. Unless you have a specific reason for not changing the ownership,







reasons. Unless you have a specific reason for not changing the ownership,









Code [perm001w]

reasons. Unless you have a specific reason for not changing the ownership, reasons. Unless you have a specific reason for not changing the ownership,

Code [perm001w]

The owner of the indicated file is not what is considered best for security












The group owner of the indicated file is not correct. This is a serious

Code [perm001w]

this should be corrected.

Code [perm002a]

reasons. Unless you have a specific reason for not changing the ownership,

Code [perm001w]

reasons. Unless you have a specific reason for not changing the ownership,

Code [perm001w]

reasons. Unless you have a specific reason for not changing the ownership, reasons. Unless you have a specific reason for not changing the ownership,

Code [perm001w]

Code [perm001w]


this should be corrected.










reasons. Unless you have a specific reason for not changing the ownership, reasons. Unless you have a specific reason for not changing the ownership,

Code [perm002a]

Code [perm001w]

Code [perm001w]

this should be corrected. reasons. Unless you have a specific reason for not changing the ownership,

Code [perm001w]

this should be corrected.

Code [perm001w]

Code [perm001w]

The group owner of the indicated file is not correct. This is a serious












this should be corrected. The owner of the indicated file is not what is considered best for security this should be corrected. this should be corrected. this should be corrected. The owner of the indicated file is not what is considered best for security reasons. Unless you have a specific reason for not changing the ownership,

Code [perm001w]




security problem and may indicate that an intrusion has occurred. The








The owner of the indicated file is not what is considered best for security The group owner of the indicated file is not correct. This is a serious this should be corrected.

Code [perm002a]

The owner of the indicated file is not what is considered best for security The owner of the indicated file is not what is considered best for security this should be corrected. The owner of the indicated file is not what is considered best for security this should be corrected. this should be corrected. The owner of the indicated file is not what is considered best for security








this should be corrected.




this should be corrected.











The owner of the indicated file is not what is considered best for security this should be corrected. The owner of the indicated file is not what is considered best for security The group owner of the indicated file is not correct. This is a serious

Code [perm001w]












The owner of the indicated file is not what is considered best for security security problem and may indicate that an intrusion has occurred. The The owner of the indicated file is not what is considered best for security The owner of the indicated file is not what is considered best for security











reasons. Unless you have a specific reason for not changing the ownership,

Code [perm002a]


reasons. Unless you have a specific reason for not changing the ownership,











The owner of the indicated file is not what is considered best for security this should be corrected.











reasons. Unless you have a specific reason for not changing the ownership, security problem and may indicate that an intrusion has occurred. The system should be checked and cleaned. The group owner of the file should be reasons. Unless you have a specific reason for not changing the ownership, The group owner of the indicated file is not correct. This is a serious reasons. Unless you have a specific reason for not changing the ownership,
reasons. Unless you have a specific reason for not changing the ownership,

































Code [perm002a]

reasons. Unless you have a specific reason for not changing the ownership,





Code [perm002a]













reasons. Unless you have a specific reason for not changing the ownership, security problem and may indicate that an intrusion has occurred. The

Code [perm002a]












The owner of the indicated file is not what is considered best for security reasons. Unless you have a specific reason for not changing the ownership,

Code [perm002a]

reasons. Unless you have a specific reason for not changing the ownership, reasons. Unless you have a specific reason for not changing the ownership, system should be checked and cleaned. The group owner of the file should be reasons. Unless you have a specific reason for not changing the ownership,

Code [perm002a]

Code [perm002a]

this should be corrected.

Code [perm002a]

this should be corrected. reasons. Unless you have a specific reason for not changing the ownership, The group owner of the indicated file is not correct. This is a serious












this should be corrected. corrected.

Code [perm002a]

Code [perm002a]

system should be checked and cleaned. The group owner of the file should be

Code [perm002a]

Code [perm002a]

this should be corrected. this should be corrected. The group owner of the indicated file is not correct. This is a serious

Code [perm002a]

this should be corrected. this should be corrected.

Code [perm002a]

security problem and may indicate that an intrusion has occurred. The The group owner of the indicated file is not correct. This is a serious

Code [perm002a]

system should be checked and cleaned. The group owner of the file should be this should be corrected. The group owner of the indicated file is not correct. This is a serious reasons. Unless you have a specific reason for not changing the ownership, The group owner of the indicated file is not correct. This is a serious this should be corrected. this should be corrected. this should be corrected. corrected. this should be corrected. The group owner of the indicated file is not correct. This is a serious The group owner of the indicated file is not correct. This is a serious









Code [perm002a]




The group owner of the indicated file is not correct. This is a serious








this should be corrected.



















security problem and may indicate that an intrusion has occurred. The

The group owner of the indicated file is not correct. This is a serious

The group owner of the indicated file is not correct. This is a serious









The group owner of the indicated file is not correct. This is a serious The group owner of the indicated file is not correct. This is a serious



The group owner of the indicated file is not correct. This is a serious








security problem and may indicate that an intrusion has occurred. The
corrected.






















The group owner of the indicated file is not correct. This is a serious security problem and may indicate that an intrusion has occurred. The system should be checked and cleaned. The group owner of the file should be The group owner of the indicated file is not correct. This is a serious security problem and may indicate that an intrusion has occurred. The corrected.
security problem and may indicate that an intrusion has occurred. The



this should be corrected.
























































Code [perm002a]

security problem and may indicate that an intrusion has occurred. The

Code [perm002a]

security problem and may indicate that an intrusion has occurred. The

Code [perm002f]











security problem and may indicate that an intrusion has occurred. The

The group owner of the indicated file is not correct. This is a serious

Code [perm002a]

Code [perm002a]

system should be checked and cleaned. The group owner of the file should be

Code [perm002a]

Code [perm002a]

Code [perm002a]

security problem and may indicate that an intrusion has occurred. The security problem and may indicate that an intrusion has occurred. The security problem and may indicate that an intrusion has occurred. The security problem and may indicate that an intrusion has occurred. The system should be checked and cleaned. The group owner of the file should be security problem and may indicate that an intrusion has occurred. The












security problem and may indicate that an intrusion has occurred. The system should be checked and cleaned. The group owner of the file should be corrected. security problem and may indicate that an intrusion has occurred. The

Code [perm002a]

Code [perm002a]

system should be checked and cleaned. The group owner of the file should be

Code [perm002f]












system should be checked and cleaned. The group owner of the file should be

Code [perm002a]












Code [perm002a]

Code [perm002a]

The group owner of the indicated file is not correct. This is a serious

Code [perm002a]

The group owner of the indicated file is not correct. This is a serious The group owner of the indicated file is not correct. With the incorrect system should be checked and cleaned. The group owner of the file should be security problem and may indicate that an intrusion has occurred. The The group owner of the indicated file is not correct. This is a serious system should be checked and cleaned. The group owner of the file should be corrected. system should be checked and cleaned. The group owner of the file should be The group owner of the indicated file is not correct. This is a serious The group owner of the indicated file is not correct. This is a serious

Code [perm002f]

The group owner of the indicated file is not correct. This is a serious The group owner of the indicated file is not correct. This is a serious system should be checked and cleaned. The group owner of the file should be system should be checked and cleaned. The group owner of the file should be system should be checked and cleaned. The group owner of the file should be system should be checked and cleaned. The group owner of the file should be system should be checked and cleaned. The group owner of the file should be corrected. system should be checked and cleaned. The group owner of the file should be corrected.












Code [perm002a]

Code [perm002f]

The group owner of the indicated file is not correct. This is a serious system should be checked and cleaned. The group owner of the file should be corrected. The group owner of the indicated file is not correct. With the incorrect The group owner of the indicated file is not correct. This is a serious The group owner of the indicated file is not correct. This is a serious corrected. The group owner of the indicated file is not correct. This is a serious security problem and may indicate that an intrusion has occurred. The The group owner of the indicated file is not correct. This is a serious corrected. security problem and may indicate that an intrusion has occurred. The The group owner of the indicated file is not correct. This is a serious group ownership, a vulnerability may exist. The group owner of the file security problem and may indicate that an intrusion has occurred. The corrected. security problem and may indicate that an intrusion has occurred. The


corrected.










security problem and may indicate that an intrusion has occurred. The security problem and may indicate that an intrusion has occurred. The The group owner of the indicated file is not correct. With the incorrect system should be checked and cleaned. The group owner of the file should be corrected. corrected. corrected.

Code [perm002f]

security problem and may indicate that an intrusion has occurred. The











corrected.












corrected. corrected. security problem and may indicate that an intrusion has occurred. The corrected. The group owner of the indicated file is not correct. With the incorrect











The group owner of the indicated file is not correct. This is a serious security problem and may indicate that an intrusion has occurred. The group ownership, a vulnerability may exist. The group owner of the file security problem and may indicate that an intrusion has occurred. The











security problem and may indicate that an intrusion has occurred. The security problem and may indicate that an intrusion has occurred. The system should be checked and cleaned. The group owner of the file should be system should be checked and cleaned. The group owner of the file should be







security problem and may indicate that an intrusion has occurred. The




Code [perm002f]

should be corrected. system should be checked and cleaned. The group owner of the file should be system should be checked and cleaned. The group owner of the file should be

corrected.











Code [perm002f]












group ownership, a vulnerability may exist. The group owner of the file system should be checked and cleaned. The group owner of the file should be system should be checked and cleaned. The group owner of the file should be

Code [perm002f]























system should be checked and cleaned. The group owner of the file should be The group owner of the indicated file is not correct. With the incorrect


























Code [perm002f]


system should be checked and cleaned. The group owner of the file should be group ownership, a vulnerability may exist. The group owner of the file






















security problem and may indicate that an intrusion has occurred. The

Code [perm002f]

system should be checked and cleaned. The group owner of the file should be should be corrected. system should be checked and cleaned. The group owner of the file should be system should be checked and cleaned. The group owner of the file should be

Code [perm002f]

system should be checked and cleaned. The group owner of the file should be corrected. The group owner of the indicated file is not correct. With the incorrect corrected. system should be checked and cleaned. The group owner of the file should be

Code [perm002f]

corrected.












corrected.

Code [perm002f]

Code [perm002f]

Code [perm002f]

Code [perm002f]












should be corrected. The group owner of the indicated file is not correct. With the incorrect corrected. corrected. group ownership, a vulnerability may exist. The group owner of the file The group owner of the indicated file is not correct. With the incorrect corrected.

Code [perm002f]

Code [perm002f]

Code [perm002f]

Code [perm002f]

The group owner of the indicated file is not correct. With the incorrect should be corrected. corrected. The group owner of the indicated file is not correct. With the incorrect







corrected.





system should be checked and cleaned. The group owner of the file should be corrected. corrected. The group owner of the indicated file is not correct. With the incorrect

Code [perm002w]

corrected.























group ownership, a vulnerability may exist. The group owner of the file The group owner of the indicated file is not correct. With the incorrect











Code [perm002f]

corrected.












The group owner of the indicated file is not correct. With the incorrect The group owner of the indicated file is not correct. With the incorrect











should be corrected. group ownership, a vulnerability may exist. The group owner of the file The group owner of the indicated file is not correct. With the incorrect











The group owner of the indicated file is not correct. With the incorrect





The group owner of the indicated file is not correct. With the incorrect













group ownership, a vulnerability may exist. The group owner of the file




The group owner of the indicated file is not correct. With the incorrect The group owner of the indicated file is not correct. With the incorrect The group owner of the indicated file is not correct. With the incorrect group ownership, a vulnerability may exist. The group owner of the file











Code [perm002w]












group ownership, a vulnerability may exist. The group owner of the file






Code [perm002f]


corrected.

















group ownership, a vulnerability may exist. The group owner of the file

Code [perm002f]

Code [perm002f]

Code [perm002f]

The group owner of the indicated file is not what is considered best for









should be corrected.


The group owner of the indicated file is not correct. With the incorrect
group ownership, a vulnerability may exist. The group owner of the file

Code [perm002f]

group ownership, a vulnerability may exist. The group owner of the file group ownership, a vulnerability may exist. The group owner of the file












Code [perm002w]


Code [perm002f]


group ownership, a vulnerability may exist. The group owner of the file should be corrected. should be corrected. group ownership, a vulnerability may exist. The group owner of the file group ownership, a vulnerability may exist. The group owner of the file

Code [perm002f]

Code [perm002f]

group ownership, a vulnerability may exist. The group owner of the file group ownership, a vulnerability may exist. The group owner of the file group ownership, a vulnerability may exist. The group owner of the file

Code [perm002w]

should be corrected. The group owner of the indicated file is not what is considered best for

Code [perm002f]

Code [perm002f]

Code [perm002f]

should be corrected. The group owner of the indicated file is not correct. With the incorrect












Code [perm002f]

should be corrected. The group owner of the indicated file is not correct. With the incorrect The group owner of the indicated file is not correct. With the incorrect The group owner of the indicated file is not correct. With the incorrect












group ownership, a vulnerability may exist. The group owner of the file security reasons. Unless you have a specific reason for not changing the

Code [perm002f]

should be corrected.

Code [perm002w]

The group owner of the indicated file is not correct. With the incorrect The group owner of the indicated file is not what is considered best for should be corrected. The group owner of the indicated file is not correct. With the incorrect












should be corrected. should be corrected. should be corrected. The group owner of the indicated file is not correct. With the incorrect should be corrected.



The group owner of the indicated file is not correct. With the incorrect








should be corrected. should be corrected. should be corrected. The group owner of the indicated file is not what is considered best for security reasons. Unless you have a specific reason for not changing the



The group owner of the indicated file is not correct. With the incorrect








The group owner of the indicated file is not correct. With the incorrect group ownership, a vulnerability may exist. The group owner of the file







Code [perm002f]


The group owner of the indicated file is not correct. With the incorrect

Code [perm002w]







group ownership, a vulnerability may exist. The group owner of the file





The group owner of the indicated file is not correct. With the incorrect group ownership, a vulnerability may exist. The group owner of the file should be corrected. group ownership, a vulnerability may exist. The group owner of the file ownership, this should be corrected. The group owner of the indicated file is not correct. With the incorrect The group owner of the indicated file is not what is considered best for











group ownership, a vulnerability may exist. The group owner of the file security reasons. Unless you have a specific reason for not changing the

Code [perm002w]












group ownership, a vulnerability may exist. The group owner of the file






















group ownership, a vulnerability may exist. The group owner of the file




Code [perm002w]













group ownership, a vulnerability may exist. The group owner of the file






















Code [perm002w]












ownership, this should be corrected.

Code [perm002w]

security reasons. Unless you have a specific reason for not changing the should be corrected. group ownership, a vulnerability may exist. The group owner of the file The group owner of the indicated file is not correct. With the incorrect

Code [perm002w]

The group owner of the indicated file is not what is considered best for group ownership, a vulnerability may exist. The group owner of the file should be corrected. group ownership, a vulnerability may exist. The group owner of the file should be corrected. group ownership, a vulnerability may exist. The group owner of the file

Code [perm002w]

group ownership, a vulnerability may exist. The group owner of the file





















should be corrected.

Code [perm002w]

security reasons. Unless you have a specific reason for not changing the should be corrected. ownership, this should be corrected. should be corrected.

Code [perm002w]

The group owner of the indicated file is not what is considered best for

Code [perm002w]

Code [perm002w]

Code [perm002w]

should be corrected.

Code [perm002w]

Code [perm002w]

Code [perm002w]

The group owner of the indicated file is not what is considered best for should be corrected. The group owner of the indicated file is not what is considered best for ownership, this should be corrected. The group owner of the indicated file is not what is considered best for























should be corrected. should be corrected. The group owner of the indicated file is not what is considered best for security reasons. Unless you have a specific reason for not changing the group ownership, a vulnerability may exist. The group owner of the file should be corrected. should be corrected.

Code [perm002w]













Code [perm003a]


should be corrected.










The group owner of the indicated file is not what is considered best for

The group owner of the indicated file is not what is considered best for















ownership, this should be corrected.






The group owner of the indicated file is not what is considered best for












security reasons. Unless you have a specific reason for not changing the The group owner of the indicated file is not what is considered best for The group owner of the indicated file is not what is considered best for











The group owner of the indicated file is not what is considered best for security reasons. Unless you have a specific reason for not changing the The group owner of the indicated file is not what is considered best for The group owner of the indicated file is not what is considered best for The group owner of the indicated file is not what is considered best for











security reasons. Unless you have a specific reason for not changing the

Code [perm003a]

security reasons. Unless you have a specific reason for not changing the




















Code [perm002w]


Code [perm002w]









should be corrected.



ownership, this should be corrected.

Code [perm002w]












security reasons. Unless you have a specific reason for not changing the The access permissions of the indicated file are incorrect. This may

Code [perm002w]

Code [perm003a]

Code [perm002w]

The group owner of the indicated file is not what is considered best for












Code [perm002w]

security reasons. Unless you have a specific reason for not changing the












security reasons. Unless you have a specific reason for not changing the

Code [perm002w]

security reasons. Unless you have a specific reason for not changing the


ownership, this should be corrected.










security reasons. Unless you have a specific reason for not changing the ownership, this should be corrected. security reasons. Unless you have a specific reason for not changing the security reasons. Unless you have a specific reason for not changing the

Code [perm002w]

security reasons. Unless you have a specific reason for not changing the security reasons. Unless you have a specific reason for not changing the ownership, this should be corrected.

Code [perm003a]

The access permissions of the indicated file are incorrect. This may security reasons. Unless you have a specific reason for not changing the

Code [perm002w]

Code [perm002w]

ownership, this should be corrected. The group owner of the indicated file is not what is considered best for

Code [perm002w]












The group owner of the indicated file is not what is considered best for The group owner of the indicated file is not what is considered best for











indicate an intrusion has occurred. In any event, it is a serious security ownership, this should be corrected. The group owner of the indicated file is not what is considered best for

Code [perm002w]

The access permissions of the indicated file are incorrect. This may

Code [perm002w]

The group owner of the indicated file is not what is considered best for The group owner of the indicated file is not what is considered best for ownership, this should be corrected. ownership, this should be corrected. The group owner of the indicated file is not what is considered best for

Code [perm003a]

security reasons. Unless you have a specific reason for not changing the




ownership, this should be corrected.








ownership, this should be corrected. ownership, this should be corrected. ownership, this should be corrected. ownership, this should be corrected.











ownership, this should be corrected. The group owner of the indicated file is not what is considered best for











The access permissions of the indicated file are incorrect. This may indicate an intrusion has occurred. In any event, it is a serious security

Code [perm003a]

The group owner of the indicated file is not what is considered best for












ownership, this should be corrected. The group owner of the indicated file is not what is considered best for security reasons. Unless you have a specific reason for not changing the

Code [perm002w]

security reasons. Unless you have a specific reason for not changing the security reasons. Unless you have a specific reason for not changing the The group owner of the indicated file is not what is considered best for security reasons. Unless you have a specific reason for not changing the


problem and should be corrected immediately. The system should also be










indicate an intrusion has occurred. In any event, it is a serious security The group owner of the indicated file is not what is considered best for security reasons. Unless you have a specific reason for not changing the The group owner of the indicated file is not what is considered best for




























ownership, this should be corrected.

Code [perm003a]

security reasons. Unless you have a specific reason for not changing the security reasons. Unless you have a specific reason for not changing the The access permissions of the indicated file are incorrect. This may

Code [perm003a]














Code [perm003a]


































security reasons. Unless you have a specific reason for not changing the

Code [perm003a]

indicate an intrusion has occurred. In any event, it is a serious security security reasons. Unless you have a specific reason for not changing the problem and should be corrected immediately. The system should also be The access permissions of the indicated file are incorrect. This may












ownership, this should be corrected. security reasons. Unless you have a specific reason for not changing the ownership, this should be corrected.

Code [perm003a]

ownership, this should be corrected. The group owner of the indicated file is not what is considered best for security reasons. Unless you have a specific reason for not changing the checked for signs of intrusion. problem and should be corrected immediately. The system should also be ownership, this should be corrected.

Code [perm003a]

ownership, this should be corrected.

Code [perm003a]

security reasons. Unless you have a specific reason for not changing the

Code [perm003a]

Code [perm003a]

Code [perm003a]

Code [perm003a]

security reasons. Unless you have a specific reason for not changing the










The access permissions of the indicated file are incorrect. This may


ownership, this should be corrected. indicate an intrusion has occurred. In any event, it is a serious security

Code [perm003a]

ownership, this should be corrected.

Code [perm003a]

The access permissions of the indicated file are incorrect. This may The access permissions of the indicated file are incorrect. This may ownership, this should be corrected.

Code [perm003a]

checked for signs of intrusion. problem and should be corrected immediately. The system should also be indicate an intrusion has occurred. In any event, it is a serious security









ownership, this should be corrected.



The access permissions of the indicated file are incorrect. This may ownership, this should be corrected.



























ownership, this should be corrected.

The access permissions of the indicated file are incorrect. This may security reasons. Unless you have a specific reason for not changing the
checked for signs of intrusion.











The access permissions of the indicated file are incorrect. This may The access permissions of the indicated file are incorrect. This may











ownership, this should be corrected.

Code [perm003a]

The access permissions of the indicated file are incorrect. This may The access permissions of the indicated file are incorrect. This may The access permissions of the indicated file are incorrect. This may ownership, this should be corrected. indicate an intrusion has occurred. In any event, it is a serious security The access permissions of the indicated file are incorrect. This may The access permissions of the indicated file are incorrect. This may



problem and should be corrected immediately. The system should also be









The access permissions of the indicated file are incorrect. This may











indicate an intrusion has occurred. In any event, it is a serious security indicate an intrusion has occurred. In any event, it is a serious security











Code [perm003a]

The access permissions of the indicated file are incorrect. This may












checked for signs of intrusion.











Code [perm003a]

problem and should be corrected immediately. The system should also be

Code [perm003a]









indicate an intrusion has occurred. In any event, it is a serious security



Code [perm003f]

indicate an intrusion has occurred. In any event, it is a serious security ownership, this should be corrected.

Code [perm003a]























Code [perm003a]

indicate an intrusion has occurred. In any event, it is a serious security indicate an intrusion has occurred. In any event, it is a serious security












Code [perm003a]

The access permissions of the indicated file are incorrect. This may indicate an intrusion has occurred. In any event, it is a serious security indicate an intrusion has occurred. In any event, it is a serious security


problem and should be corrected immediately. The system should also be







indicate an intrusion has occurred. In any event, it is a serious security

indicate an intrusion has occurred. In any event, it is a serious security


checked for signs of intrusion.

Code [perm003a]

indicate an intrusion has occurred. In any event, it is a serious security indicate an intrusion has occurred. In any event, it is a serious security

Code [perm003a]

problem and should be corrected immediately. The system should also be

Code [perm003f]

problem and should be corrected immediately. The system should also be The access permissions of the indicated file are incorrect. This may

Code [perm003a]

indicate an intrusion has occurred. In any event, it is a serious security

Code [perm003a]












The access permissions of the indicated file are incorrect. This may problem and should be corrected immediately. The system should also be checked for signs of intrusion. The access permissions of the indicated file are incorrect. This may

Code [perm003a]

The access permissions of the indicated file are incorrect. This may

Code [perm003f]












Code [perm003a]

The access permissions of the indicated file are incorrect. This may The access permissions of the indicated file are incorrect. This may problem and should be corrected immediately. The system should also be problem and should be corrected immediately. The system should also be problem and should be corrected immediately. The system should also be indicate an intrusion has occurred. In any event, it is a serious security The access permissions of the indicated file are incorrect. This may

Code [perm003a]

checked for signs of intrusion. problem and should be corrected immediately. The system should also be




problem and should be corrected immediately. The system should also be








problem and should be corrected immediately. The system should also be problem and should be corrected immediately. The system should also be problem and should be corrected immediately. The system should also be problem and should be corrected immediately. The system should also be The access permissions of the indicated file are incorrect. This may The access permissions of the indicated file are incorrect. This may checked for signs of intrusion. The access permissions of the indicated file are incorrect. This may indicate an intrusion has occurred. In any event, it is a serious security checked for signs of intrusion. The access permissions of the indicated file are incorrect. This may

Code [perm003f]

problem and should be corrected immediately. The system should also be The access permissions of the indicated file are incorrect. This may The access permissions of the indicated file are incorrect. This may

Code [perm003a]

The access permissions of the indicated file are incorrect. This may create a vulnerability in the system. This should be corrected immediately. indicate an intrusion has occurred. In any event, it is a serious security












indicate an intrusion has occurred. In any event, it is a serious security checked for signs of intrusion. The access permissions of the indicated file are incorrect. This may indicate an intrusion has occurred. In any event, it is a serious security indicate an intrusion has occurred. In any event, it is a serious security checked for signs of intrusion. checked for signs of intrusion.

Code [perm003f]

checked for signs of intrusion. problem and should be corrected immediately. The system should also be indicate an intrusion has occurred. In any event, it is a serious security The access permissions of the indicated file are incorrect. This may












checked for signs of intrusion. checked for signs of intrusion. checked for signs of intrusion. checked for signs of intrusion. checked for signs of intrusion. indicate an intrusion has occurred. In any event, it is a serious security checked for signs of intrusion. indicate an intrusion has occurred. In any event, it is a serious security









create a vulnerability in the system. This should be corrected immediately.

problem and should be corrected immediately. The system should also be










indicate an intrusion has occurred. In any event, it is a serious security


The access permissions of the indicated file are incorrect. This may indicate an intrusion has occurred. In any event, it is a serious security

Code [perm003f]

create a vulnerability in the system. This should be corrected immediately. The access permissions of the indicated file are incorrect. This may checked for signs of intrusion. indicate an intrusion has occurred. In any event, it is a serious security









problem and should be corrected immediately. The system should also be






problem and should be corrected immediately. The system should also be








indicate an intrusion has occurred. In any event, it is a serious security problem and should be corrected immediately. The system should also be problem and should be corrected immediately. The system should also be













Code [perm003f]

The access permissions of the indicated file are incorrect. This may












checked for signs of intrusion.


problem and should be corrected immediately. The system should also be









indicate an intrusion has occurred. In any event, it is a serious security

































Code [perm003f]

problem and should be corrected immediately. The system should also be

Code [perm003f]

problem and should be corrected immediately. The system should also be


checked for signs of intrusion.
































problem and should be corrected immediately. The system should also be

Code [perm003w]

create a vulnerability in the system. This should be corrected immediately.












Code [perm003f]

The access permissions of the indicated file are incorrect. This may problem and should be corrected immediately. The system should also be problem and should be corrected immediately. The system should also be indicate an intrusion has occurred. In any event, it is a serious security












checked for signs of intrusion. checked for signs of intrusion.

Code [perm003f]

problem and should be corrected immediately. The system should also be

Code [perm003f]

Code [perm003f]

The access permissions of the indicated file are incorrect. This may checked for signs of intrusion. checked for signs of intrusion. create a vulnerability in the system. This should be corrected immediately.

Code [perm003f]

Code [perm003f]

Code [perm003f]

problem and should be corrected immediately. The system should also be

Code [perm003f]

checked for signs of intrusion.


Code [perm003f]

The access permissions of the indicated file are incorrect. This may

Code [perm003f]

Code [perm003w]






checked for signs of intrusion.






checked for signs of intrusion. The access permissions of the indicated file are incorrect. This may

Code [perm003w]

checked for signs of intrusion.

Code [perm003f]

The access permissions of the indicated file are incorrect. This may create a vulnerability in the system. This should be corrected immediately. checked for signs of intrusion. checked for signs of intrusion. problem and should be corrected immediately. The system should also be The access permissions of the indicated file are not what is considered












The access permissions of the indicated file are incorrect. This may checked for signs of intrusion.











The access permissions of the indicated file are incorrect. This may





















The access permissions of the indicated file are incorrect. This may

create a vulnerability in the system. This should be corrected immediately.
The access permissions of the indicated file are incorrect. This may




















The access permissions of the indicated file are incorrect. This may

Code [perm003f]

The access permissions of the indicated file are incorrect. This may The access permissions of the indicated file are incorrect. This may





checked for signs of intrusion.







Code [perm003f]

The access permissions of the indicated file are not what is considered create a vulnerability in the system. This should be corrected immediately. The access permissions of the indicated file are incorrect. This may












The access permissions of the indicated file are incorrect. This may create a vulnerability in the system. This should be corrected immediately. The access permissions of the indicated file are not what is considered

Code [perm003w]













create a vulnerability in the system. This should be corrected immediately.


















checked for signs of intrusion.











best for security. Unless you have a reason for not doing so, the permissions The access permissions of the indicated file are incorrect. This may

Code [perm003f]

Code [perm003f]

create a vulnerability in the system. This should be corrected immediately.

Code [perm003f]












Code [perm003w]

create a vulnerability in the system. This should be corrected immediately.

Code [perm003f]












create a vulnerability in the system. This should be corrected immediately.

Code [perm003f]

create a vulnerability in the system. This should be corrected immediately. create a vulnerability in the system. This should be corrected immediately. The access permissions of the indicated file are incorrect. This may create a vulnerability in the system. This should be corrected immediately. create a vulnerability in the system. This should be corrected immediately.


The access permissions of the indicated file are incorrect. This may










Code [perm003f]

best for security. Unless you have a reason for not doing so, the permissions












Code [perm003f]

create a vulnerability in the system. This should be corrected immediately. create a vulnerability in the system. This should be corrected immediately. best for security. Unless you have a reason for not doing so, the permissions

Code [perm003f]

The access permissions of the indicated file are not what is considered

Code [perm003f]

Code [perm003w]















Code [perm003f]



should be corrected.











The access permissions of the indicated file are incorrect. This may The access permissions of the indicated file are incorrect. This may

Code [perm003f]

create a vulnerability in the system. This should be corrected immediately.












The access permissions of the indicated file are incorrect. This may

Code [perm003w]

The access permissions of the indicated file are not what is considered The access permissions of the indicated file are incorrect. This may












The access permissions of the indicated file are incorrect. This may











Code [perm003f]


create a vulnerability in the system. This should be corrected immediately.






























The access permissions of the indicated file are incorrect. This may

Code [perm003w]






should be corrected.


create a vulnerability in the system. This should be corrected immediately.
























should be corrected.

Code [perm003w]

The access permissions of the indicated file are incorrect. This may

Code [perm003w]

The access permissions of the indicated file are incorrect. This may best for security. Unless you have a reason for not doing so, the permissions

Code [perm003f]

The access permissions of the indicated file are not what is considered The access permissions of the indicated file are incorrect. This may












The access permissions of the indicated file are incorrect. This may

Code [perm003w]












Code [perm003w]

create a vulnerability in the system. This should be corrected immediately. create a vulnerability in the system. This should be corrected immediately. best for security. Unless you have a reason for not doing so, the permissions The access permissions of the indicated file are not what is considered The access permissions of the indicated file are incorrect. This may create a vulnerability in the system. This should be corrected immediately. create a vulnerability in the system. This should be corrected immediately.

Code [perm003w]

Code [perm003w]

Code [perm003w]

Code [perm003w]

create a vulnerability in the system. This should be corrected immediately.












The access permissions of the indicated file are incorrect. This may

Code [perm003w]

The access permissions of the indicated file are not what is considered

Code [perm003w]























create a vulnerability in the system. This should be corrected immediately.











The access permissions of the indicated file are not what is considered The access permissions of the indicated file are not what is considered create a vulnerability in the system. This should be corrected immediately.

Code [perm003w]

Code [perm004c]

best for security. Unless you have a reason for not doing so, the permissions should be corrected. The access permissions of the indicated file are incorrect. This may create a vulnerability in the system. This should be corrected immediately. create a vulnerability in the system. This should be corrected immediately. The access permissions of the indicated file are not what is considered

Code [perm003w]

create a vulnerability in the system. This should be corrected immediately.












should be corrected.






















best for security. Unless you have a reason for not doing so, the permissions

Code [perm003w]


The access permissions of the indicated file are not what is considered create a vulnerability in the system. This should be corrected immediately. The access permissions of the indicated file are not what is considered The access permissions of the indicated file are not what is considered The access permissions of the indicated file are not what is considered The access permissions of the indicated file are not what is considered











create a vulnerability in the system. This should be corrected immediately. The access permissions of the indicated file are not what is considered

Code [perm004c]

Code [perm003w]

Code [perm004c]

The access permissions of the indicated file are not what is considered best for security. Unless you have a reason for not doing so, the permissions best for security. Unless you have a reason for not doing so, the permissions











best for security. Unless you have a reason for not doing so, the permissions

No file permissions database can be found. This will prevent the The access permissions of the indicated file are not what is considered











should be corrected.








create a vulnerability in the system. This should be corrected immediately.















Code [perm003w]


best for security. Unless you have a reason for not doing so, the permissions










Code [perm003w]


Code [perm003w]

The access permissions of the indicated file are not what is considered

Code [perm003w]

should be corrected.












best for security. Unless you have a reason for not doing so, the permissions The access permissions of the indicated file are not what is considered

Code [perm003w]












best for security. Unless you have a reason for not doing so, the permissions best for security. Unless you have a reason for not doing so, the permissions best for security. Unless you have a reason for not doing so, the permissions best for security. Unless you have a reason for not doing so, the permissions best for security. Unless you have a reason for not doing so, the permissions











No file permissions database can be found. This will prevent the The access permissions of the indicated file are not what is considered best for security. Unless you have a reason for not doing so, the permissions No file permissions database can be found. This will prevent the

Code [perm003w]

should be corrected.

Code [perm003w]

should be corrected. checks of file ownerships to be performed. This likely indicates best for security. Unless you have a reason for not doing so, the permissions

Code [perm003w]

Code [perm003w]

should be corrected.












Code [perm004c]

Code [perm003w]

The access permissions of the indicated file are not what is considered









should be corrected.



The access permissions of the indicated file are not what is considered

Code [perm004c]

best for security. Unless you have a reason for not doing so, the permissions The access permissions of the indicated file are not what is considered The access permissions of the indicated file are not what is considered

Code [perm003w]












The access permissions of the indicated file are not what is considered should be corrected. should be corrected. should be corrected. should be corrected. best for security. Unless you have a reason for not doing so, the permissions

Code [perm003w]

should be corrected. should be corrected. best for security. Unless you have a reason for not doing so, the permissions checks of file ownerships to be performed. This likely indicates should be corrected. checks of file ownerships to be performed. This likely indicates The access permissions of the indicated file are not what is considered






The access permissions of the indicated file are not what is considered






should be corrected.

Code [perm004c]

that a complete port has not been done for this platform. The access permissions of the indicated file are not what is considered The access permissions of the indicated file are not what is considered























Code [perm003w]

No file permissions database can be found. This will prevent the best for security. Unless you have a reason for not doing so, the permissions best for security. Unless you have a reason for not doing so, the permissions should be corrected.








No file permissions database can be found. This will prevent the




best for security. Unless you have a reason for not doing so, the permissions best for security. Unless you have a reason for not doing so, the permissions

Code [perm004c]

The access permissions of the indicated file are not what is considered The access permissions of the indicated file are not what is considered best for security. Unless you have a reason for not doing so, the permissions

























should be corrected.










The access permissions of the indicated file are not what is considered

















should be corrected.
















that a complete port has not been done for this platform.

Code [perm004c]

that a complete port has not been done for this platform. best for security. Unless you have a reason for not doing so, the permissions

Code [perm004c]

best for security. Unless you have a reason for not doing so, the permissions


No file permissions database can be found. This will prevent the










Code [perm004c]




best for security. Unless you have a reason for not doing so, the permissions








best for security. Unless you have a reason for not doing so, the permissions The access permissions of the indicated file are not what is considered checks of file ownerships to be performed. This likely indicates should be corrected.

Code [perm004c]

should be corrected.







Code [perm004c]


checks of file ownerships to be performed. This likely indicates should be corrected. should be corrected. best for security. Unless you have a reason for not doing so, the permissions

Code [perm004c]

No file permissions database can be found. This will prevent the best for security. Unless you have a reason for not doing so, the permissions should be corrected.

Code [perm004c]

Code [perm004c]

Code [perm004c]

Code [perm004c]

Code [perm004c]

best for security. Unless you have a reason for not doing so, the permissions























No file permissions database can be found. This will prevent the











should be corrected.











Code [perm005a]

No file permissions database can be found. This will prevent the

Code [perm004c]

checks of file ownerships to be performed. This likely indicates No file permissions database can be found. This will prevent the should be corrected. should be corrected.




best for security. Unless you have a reason for not doing so, the permissions








should be corrected.

Code [perm004c]

No file permissions database can be found. This will prevent the that a complete port has not been done for this platform.























that a complete port has not been done for this platform. No file permissions database can be found. This will prevent the should be corrected. checks of file ownerships to be performed. This likely indicates No file permissions database can be found. This will prevent the






















should be corrected.

Code [perm004c]

No file permissions database can be found. This will prevent the No file permissions database can be found. This will prevent the No file permissions database can be found. This will prevent the No file permissions database can be found. This will prevent the No file permissions database can be found. This will prevent the

Code [perm005a]

should be corrected.

Code [perm004c]

Code [perm005a]

checks of file ownerships to be performed. This likely indicates












checks of file ownerships to be performed. This likely indicates that a complete port has not been done for this platform. The /etc/security directory contains security information that should

Code [perm004c]

No file permissions database can be found. This will prevent the checks of file ownerships to be performed. This likely indicates













should be corrected.

No file permissions database can be found. This will prevent the checks of file ownerships to be performed. This likely indicates

Code [perm004c]

Code [perm004c]























Code [perm004c]












checks of file ownerships to be performed. This likely indicates

Code [perm004c]

checks of file ownerships to be performed. This likely indicates









that a complete port has not been done for this platform.














checks of file ownerships to be performed. This likely indicates checks of file ownerships to be performed. This likely indicates checks of file ownerships to be performed. This likely indicates No file permissions database can be found. This will prevent the checks of file ownerships to be performed. This likely indicates checks of file ownerships to be performed. This likely indicates The /etc/security directory contains security information that should No file permissions database can be found. This will prevent the


that a complete port has not been done for this platform.

The /etc/security directory contains security information that should








Code [perm004c]

that a complete port has not been done for this platform. not be accessible by non-root users. The owner should be root, and group that a complete port has not been done for this platform.











No file permissions database can be found. This will prevent the

Code [perm004c]

Code [perm004c]

checks of file ownerships to be performed. This likely indicates

Code [perm004c]












Code [perm005a]

Code [perm004c]

that a complete port has not been done for this platform. No file permissions database can be found. This will prevent the checks of file ownerships to be performed. This likely indicates No file permissions database can be found. This will prevent the No file permissions database can be found. This will prevent the No file permissions database can be found. This will prevent the

Code [perm005a]

that a complete port has not been done for this platform.

Code [perm004c]

that a complete port has not been done for this platform.












that a complete port has not been done for this platform. that a complete port has not been done for this platform. checks of file ownerships to be performed. This likely indicates

Code [perm004c]

that a complete port has not been done for this platform. that a complete port has not been done for this platform. that a complete port has not been done for this platform. not be accessible by non-root users. The owner should be root, and group checks of file ownerships to be performed. This likely indicates

No file permissions database can be found. This will prevent the











not be accessible by non-root users. The owner should be root, and group











and world should have only search access (mode 711). The directory









Code [perm005a]


checks of file ownerships to be performed. This likely indicates

Code [perm004c]

No file permissions database can be found. This will prevent the No file permissions database can be found. This will prevent the No file permissions database can be found. This will prevent the that a complete port has not been done for this platform. checks of file ownerships to be performed. This likely indicates checks of file ownerships to be performed. This likely indicates

No file permissions database can be found. This will prevent the











that a complete port has not been done for this platform. The /etc/security directory contains security information that should checks of file ownerships to be performed. This likely indicates checks of file ownerships to be performed. This likely indicates

Code [perm005a]












No file permissions database can be found. This will prevent the




The /etc/security directory contains security information that should


















that a complete port has not been done for this platform.






















Code [perm005a]

that a complete port has not been done for this platform.























No file permissions database can be found. This will prevent the and world should have only search access (mode 711). The directory and world should have only search access (mode 711). The directory

Code [perm005a]

Code [perm005a]

checks of file ownerships to be performed. This likely indicates unfortunately must be search-able because of some library routines which that a complete port has not been done for this platform. The /etc/security directory contains security information that should No file permissions database can be found. This will prevent the checks of file ownerships to be performed. This likely indicates











Code [perm005a]


checks of file ownerships to be performed. This likely indicates checks of file ownerships to be performed. This likely indicates that a complete port has not been done for this platform. that a complete port has not been done for this platform. not be accessible by non-root users. The owner should be root, and group that a complete port has not been done for this platform.

Code [perm005a]


that a complete port has not been done for this platform.


checks of file ownerships to be performed. This likely indicates


The /etc/security directory contains security information that should






Code [perm005a]

Code [perm005a]

checks of file ownerships to be performed. This likely indicates not be accessible by non-root users. The owner should be root, and group

Code [perm005a]

Code [perm005a]

Code [perm005a]











Code [perm005a]


The /etc/security directory contains security information that should











The /etc/security directory contains security information that should checks of file ownerships to be performed. This likely indicates unfortunately must be search-able because of some library routines which unfortunately must be search-able because of some library routines which The /etc/security directory contains security information that should that a complete port has not been done for this platform. check for the existence of the security.adjunct file. The files in the

Code [perm005a]

not be accessible by non-root users. The owner should be root, and group checks of file ownerships to be performed. This likely indicates












The /etc/security directory contains security information that should that a complete port has not been done for this platform.






that a complete port has not been done for this platform.





that a complete port has not been done for this platform.

Code [perm005a]

The /etc/security directory contains security information that should and world should have only search access (mode 711). The directory The /etc/security directory contains security information that should






















not be accessible by non-root users. The owner should be root, and group



The /etc/security directory contains security information that should








that a complete port has not been done for this platform. that a complete port has not been done for this platform. and world should have only search access (mode 711). The directory

Code [perm005a]

The /etc/security directory contains security information that should

Code [perm005a]

The /etc/security directory contains security information that should The /etc/security directory contains security information that should The /etc/security directory contains security information that should that a complete port has not been done for this platform. not be accessible by non-root users. The owner should be root, and group not be accessible by non-root users. The owner should be root, and group












check for the existence of the security.adjunct file. The files in the not be accessible by non-root users. The owner should be root, and group check for the existence of the security.adjunct file. The files in the The /etc/security directory contains security information that should

Code [perm005a]

Code [perm005a]

directory should be mode 600. that a complete port has not been done for this platform. and world should have only search access (mode 711). The directory


































not be accessible by non-root users. The owner should be root, and group

Code [perm005a]

The /etc/security directory contains security information that should

Code [perm005a]

Code [perm005a]

not be accessible by non-root users. The owner should be root, and group unfortunately must be search-able because of some library routines which not be accessible by non-root users. The owner should be root, and group












and world should have only search access (mode 711). The directory
unfortunately must be search-able because of some library routines which
not be accessible by non-root users. The owner should be root, and group

The /etc/security directory contains security information that should










not be accessible by non-root users. The owner should be root, and group not be accessible by non-root users. The owner should be root, and group The /etc/security directory contains security information that should not be accessible by non-root users. The owner should be root, and group not be accessible by non-root users. The owner should be root, and group

Code [perm005a]

and world should have only search access (mode 711). The directory and world should have only search access (mode 711). The directory












directory should be mode 600. directory should be mode 600. and world should have only search access (mode 711). The directory

Code [perm005a]

Code [perm005a]

The /etc/security directory contains security information that should





not be accessible by non-root users. The owner should be root, and group






unfortunately must be search-able because of some library routines which

Code [perm005a]

The /etc/security directory contains security information that should












and world should have only search access (mode 711). The directory The /etc/security directory contains security information that should not be accessible by non-root users. The owner should be root, and group The /etc/security directory contains security information that should

Code [perm005a]

The /etc/security directory contains security information that should and world should have only search access (mode 711). The directory and world should have only search access (mode 711). The directory

Code [perm005a]

check for the existence of the security.adjunct file. The files in the unfortunately must be search-able because of some library routines which not be accessible by non-root users. The owner should be root, and group and world should have only search access (mode 711). The directory and world should have only search access (mode 711). The directory check for the existence of the security.adjunct file. The files in the and world should have only search access (mode 711). The directory not be accessible by non-root users. The owner should be root, and group and world should have only search access (mode 711). The directory and world should have only search access (mode 711). The directory unfortunately must be search-able because of some library routines which

Code [perm005a]

unfortunately must be search-able because of some library routines which The /etc/security directory contains security information that should























Code [perm006w]

unfortunately must be search-able because of some library routines which not be accessible by non-root users. The owner should be root, and group The /etc/security directory contains security information that should The /etc/security directory contains security information that should and world should have only search access (mode 711). The directory check for the existence of the security.adjunct file. The files in the

Code [perm005a]

The /etc/security directory contains security information that should not be accessible by non-root users. The owner should be root, and group not be accessible by non-root users. The owner should be root, and group unfortunately must be search-able because of some library routines which unfortunately must be search-able because of some library routines which The /etc/security directory contains security information that should not be accessible by non-root users. The owner should be root, and group not be accessible by non-root users. The owner should be root, and group and world should have only search access (mode 711). The directory The /etc/security directory contains security information that should unfortunately must be search-able because of some library routines which directory should be mode 600. and world should have only search access (mode 711). The directory check for the existence of the security.adjunct file. The files in the unfortunately must be search-able because of some library routines which directory should be mode 600. unfortunately must be search-able because of some library routines which and world should have only search access (mode 711). The directory unfortunately must be search-able because of some library routines which unfortunately must be search-able because of some library routines which

Code [perm006w]

unfortunately must be search-able because of some library routines which not be accessible by non-root users. The owner should be root, and group

Code [perm006w]

The /etc/security directory contains security information that should check for the existence of the security.adjunct file. The files in the check for the existence of the security.adjunct file. The files in the The configuration files (.login, .profile, etc) should be not be writable and world should have only search access (mode 711). The directory not be accessible by non-root users. The owner should be root, and group check for the existence of the security.adjunct file. The files in the directory should be mode 600. unfortunately must be search-able because of some library routines which not be accessible by non-root users. The owner should be root, and group not be accessible by non-root users. The owner should be root, and group and world should have only search access (mode 711). The directory and world should have only search access (mode 711). The directory The /etc/security directory contains security information that should check for the existence of the security.adjunct file. The files in the check for the existence of the security.adjunct file. The files in the not be accessible by non-root users. The owner should be root, and group and world should have only search access (mode 711). The directory unfortunately must be search-able because of some library routines which and world should have only search access (mode 711). The directory check for the existence of the security.adjunct file. The files in the not be accessible by non-root users. The owner should be root, and group






directory should be mode 600.






unfortunately must be search-able because of some library routines which check for the existence of the security.adjunct file. The files in the
unfortunately must be search-able because of some library routines which











check for the existence of the security.adjunct file. The files in the check for the existence of the security.adjunct file. The files in the check for the existence of the security.adjunct file. The files in the The configuration files (.login, .profile, etc) should be not be writable The configuration files (.login, .profile, etc) should be not be writable and world should have only search access (mode 711). The directory directory should be mode 600. check for the existence of the security.adjunct file. The files in the not be accessible by non-root users. The owner should be root, and group by non-root users. In addition, the .rhosts file should not be readable directory should be mode 600. unfortunately must be search-able because of some library routines which directory should be mode 600. and world should have only search access (mode 711). The directory and world should have only search access (mode 711). The directory unfortunately must be search-able because of some library routines which











and world should have only search access (mode 711). The directory directory should be mode 600. unfortunately must be search-able because of some library routines which directory should be mode 600. not be accessible by non-root users. The owner should be root, and group and world should have only search access (mode 711). The directory check for the existence of the security.adjunct file. The files in the check for the existence of the security.adjunct file. The files in the unfortunately must be search-able because of some library routines which

Code [perm006w]

directory should be mode 600. unfortunately must be search-able because of some library routines which and world should have only search access (mode 711). The directory












check for the existence of the security.adjunct file. The files in the check for the existence of the security.adjunct file. The files in the

Code [perm006w]

directory should be mode 600. directory should be mode 600. directory should be mode 600. by non-root users. In addition, the .rhosts file should not be readable directory should be mode 600. unfortunately must be search-able because of some library routines which











by non-root users. In addition, the .rhosts file should not be readable

directory should be mode 600. and world should have only search access (mode 711). The directory or writable by non-root users.











check for the existence of the security.adjunct file. The files in the






Code [perm006w]


unfortunately must be search-able because of some library routines which unfortunately must be search-able because of some library routines which unfortunately must be search-able because of some library routines which check for the existence of the security.adjunct file. The files in the check for the existence of the security.adjunct file. The files in the






















and world should have only search access (mode 711). The directory directory should be mode 600. unfortunately must be search-able because of some library routines which check for the existence of the security.adjunct file. The files in the directory should be mode 600.

Code [perm006w]

The configuration files (.login, .profile, etc) should be not be writable












unfortunately must be search-able because of some library routines which directory should be mode 600. check for the existence of the security.adjunct file. The files in the directory should be mode 600. The configuration files (.login, .profile, etc) should be not be writable















Code [perm006w]

or writable by non-root users.












check for the existence of the security.adjunct file. The files in the

Code [perm006w]


















unfortunately must be search-able because of some library routines which











or writable by non-root users.

Code [perm006w]

directory should be mode 600. check for the existence of the security.adjunct file. The files in the The configuration files (.login, .profile, etc) should be not be writable

Code [perm006w]

check for the existence of the security.adjunct file. The files in the

Code [perm006w]

check for the existence of the security.adjunct file. The files in the directory should be mode 600. unfortunately must be search-able because of some library routines which




directory should be mode 600.








check for the existence of the security.adjunct file. The files in the






Code [perm006w]


directory should be mode 600. The configuration files (.login, .profile, etc) should be not be writable by non-root users. In addition, the .rhosts file should not be readable











directory should be mode 600. check for the existence of the security.adjunct file. The files in the

Code [perm006w]

Code [perm006w]












Code [perm006w]

The configuration files (.login, .profile, etc) should be not be writable by non-root users. In addition, the .rhosts file should not be readable

Code [perm007f]

Code [perm006w]





Code [perm006w]


check for the existence of the security.adjunct file. The files in the The configuration files (.login, .profile, etc) should be not be writable







The configuration files (.login, .profile, etc) should be not be writable




directory should be mode 600.











The configuration files (.login, .profile, etc) should be not be writable directory should be mode 600. directory should be mode 600. directory should be mode 600. The configuration files (.login, .profile, etc) should be not be writable by non-root users. In addition, the .rhosts file should not be readable check for the existence of the security.adjunct file. The files in the

Code [perm006w]
















Code [perm006w]













directory should be mode 600. by non-root users. In addition, the .rhosts file should not be readable

Code [perm006w]

The configuration files (.login, .profile, etc) should be not be writable or writable by non-root users.

Code [perm006w]

The configuration files (.login, .profile, etc) should be not be writable












The configuration files (.login, .profile, etc) should be not be writable

Code [perm007f]

The configuration files (.login, .profile, etc) should be not be writable by non-root users. In addition, the .rhosts file should not be readable or writable by non-root users. directory should be mode 600. The configuration files (.login, .profile, etc) should be not be writable The /etc/aliases, /etc/aliases.dir and /etc/aliases.pag files should not The configuration files (.login, .profile, etc) should be not be writable directory should be mode 600.

Code [perm007f]

by non-root users. In addition, the .rhosts file should not be readable by non-root users. In addition, the .rhosts file should not be readable

Code [perm006w]












Code [perm006w]










or writable by non-root users.


Code [perm006w]








by non-root users. In addition, the .rhosts file should not be readable

The configuration files (.login, .profile, etc) should be not be writable




by non-root users. In addition, the .rhosts file should not be readable

Code [perm006w]


The configuration files (.login, .profile, etc) should be not be writable The configuration files (.login, .profile, etc) should be not be writable directory should be mode 600. by non-root users. In addition, the .rhosts file should not be readable











or writable by non-root users.











Code [perm006w]

by non-root users. In addition, the .rhosts file should not be readable The configuration files (.login, .profile, etc) should be not be writable by non-root users. In addition, the .rhosts file should not be readable The /etc/aliases, /etc/aliases.dir and /etc/aliases.pag files should not or writable by non-root users. by non-root users. In addition, the .rhosts file should not be readable by non-root users. In addition, the .rhosts file should not be readable be writable by non-root users. On SunOS 4 systems, these files are























by non-root users. In addition, the .rhosts file should not be readable











The /etc/aliases, /etc/aliases.dir and /etc/aliases.pag files should not

Code [perm006w]

or writable by non-root users. The configuration files (.login, .profile, etc) should be not be writable

Code [perm006w]

or writable by non-root users. The configuration files (.login, .profile, etc) should be not be writable

Code [perm006w]

Code [perm006w]












or writable by non-root users. or writable by non-root users. The configuration files (.login, .profile, etc) should be not be writable The configuration files (.login, .profile, etc) should be not be writable by non-root users. In addition, the .rhosts file should not be readable by non-root users. In addition, the .rhosts file should not be readable by non-root users. In addition, the .rhosts file should not be readable

Code [perm006w]

or writable by non-root users.

Code [perm007f]



The configuration files (.login, .profile, etc) should be not be writable









or writable by non-root users.







Code [perm006w]


or writable by non-root users. or writable by non-root users. by non-root users. In addition, the .rhosts file should not be readable

Code [perm007f]

be writable by non-root users. On SunOS 4 systems, these files are


or writable by non-root users. shipped world writable. The permissions should be 644 on all three

Code [perm006w]

or writable by non-root users. be writable by non-root users. On SunOS 4 systems, these files are The configuration files (.login, .profile, etc) should be not be writable

Code [perm007f]

by non-root users. In addition, the .rhosts file should not be readable






The configuration files (.login, .profile, etc) should be not be writable






The configuration files (.login, .profile, etc) should be not be writable
by non-root users. In addition, the .rhosts file should not be readable











by non-root users. In addition, the .rhosts file should not be readable












The configuration files (.login, .profile, etc) should be not be writable by non-root users. In addition, the .rhosts file should not be readable or writable by non-root users. or writable by non-root users. or writable by non-root users.

Code [perm006w]








The configuration files (.login, .profile, etc) should be not be writable




by non-root users. In addition, the .rhosts file should not be readable

Code [perm007f]

The /etc/aliases, /etc/aliases.dir and /etc/aliases.pag files should not












Code [perm007f]

or writable by non-root users. The configuration files (.login, .profile, etc) should be not be writable












shipped world writable. The permissions should be 644 on all three








The /etc/aliases, /etc/aliases.dir and /etc/aliases.pag files should not

files. If left writable, program aliases can be added which can

The configuration files (.login, .profile, etc) should be not be writable











shipped world writable. The permissions should be 644 on all three by non-root users. In addition, the .rhosts file should not be readable

Code [perm007f]

The /etc/aliases, /etc/aliases.dir and /etc/aliases.pag files should not or writable by non-root users.

Code [perm007f]

by non-root users. In addition, the .rhosts file should not be readable

Code [perm007f]

Code [perm007f]

by non-root users. In addition, the .rhosts file should not be readable by non-root users. In addition, the .rhosts file should not be readable or writable by non-root users. or writable by non-root users. or writable by non-root users.












Code [perm007f]


The configuration files (.login, .profile, etc) should be not be writable











by non-root users. In addition, the .rhosts file should not be readable The /etc/aliases, /etc/aliases.dir and /etc/aliases.pag files should not or writable by non-root users.

Code [perm007f]

Code [perm007f]







Code [perm007f]


Code [perm007f]

The /etc/aliases, /etc/aliases.dir and /etc/aliases.pag files should not by non-root users. In addition, the .rhosts file should not be readable files. If left writable, program aliases can be added which can be writable by non-root users. On SunOS 4 systems, these files are be writable by non-root users. On SunOS 4 systems, these files are

Code [perm007f]

by non-root users. In addition, the .rhosts file should not be readable allow unauthorized access. files. If left writable, program aliases can be added which can












be writable by non-root users. On SunOS 4 systems, these files are The /etc/aliases, /etc/aliases.dir and /etc/aliases.pag files should not or writable by non-root users. The /etc/aliases, /etc/aliases.dir and /etc/aliases.pag files should not or writable by non-root users. The /etc/aliases, /etc/aliases.dir and /etc/aliases.pag files should not The /etc/aliases, /etc/aliases.dir and /etc/aliases.pag files should not

Code [perm007f]

or writable by non-root users. or writable by non-root users.






















Code [perm007f]













The /etc/aliases, /etc/aliases.dir and /etc/aliases.pag files should not

Code [perm007f]

by non-root users. In addition, the .rhosts file should not be readable or writable by non-root users.

Code [perm007f]


be writable by non-root users. On SunOS 4 systems, these files are










The /etc/aliases, /etc/aliases.dir and /etc/aliases.pag files should not The /etc/aliases, /etc/aliases.dir and /etc/aliases.pag files should not The /etc/aliases, /etc/aliases.dir and /etc/aliases.pag files should not or writable by non-root users. be writable by non-root users. On SunOS 4 systems, these files are allow unauthorized access. shipped world writable. The permissions should be 644 on all three The /etc/aliases, /etc/aliases.dir and /etc/aliases.pag files should not or writable by non-root users. shipped world writable. The permissions should be 644 on all three The /etc/aliases, /etc/aliases.dir and /etc/aliases.pag files should not











Code [perm007f]

allow unauthorized access. be writable by non-root users. On SunOS 4 systems, these files are be writable by non-root users. On SunOS 4 systems, these files are shipped world writable. The permissions should be 644 on all three












be writable by non-root users. On SunOS 4 systems, these files are











be writable by non-root users. On SunOS 4 systems, these files are

Code [perm007f]

The /etc/aliases, /etc/aliases.dir and /etc/aliases.pag files should not

Code [perm007f]




Code [perm007f]


The /etc/aliases, /etc/aliases.dir and /etc/aliases.pag files should not be writable by non-root users. On SunOS 4 systems, these files are







The /etc/aliases, /etc/aliases.dir and /etc/aliases.pag files should not




or writable by non-root users.

Code [perm007f]












shipped world writable. The permissions should be 644 on all three The /etc/aliases, /etc/aliases.dir and /etc/aliases.pag files should not be writable by non-root users. On SunOS 4 systems, these files are be writable by non-root users. On SunOS 4 systems, these files are










be writable by non-root users. On SunOS 4 systems, these files are

Code [perm008w]

shipped world writable. The permissions should be 644 on all three be writable by non-root users. On SunOS 4 systems, these files are












files. If left writable, program aliases can be added which can











be writable by non-root users. On SunOS 4 systems, these files are files. If left writable, program aliases can be added which can shipped world writable. The permissions should be 644 on all three

Code [perm007f]

The /etc/aliases, /etc/aliases.dir and /etc/aliases.pag files should not shipped world writable. The permissions should be 644 on all three

Code [perm007f]










files. If left writable, program aliases can be added which can


Code [perm007f]

be writable by non-root users. On SunOS 4 systems, these files are The /etc/aliases, /etc/aliases.dir and /etc/aliases.pag files should not shipped world writable. The permissions should be 644 on all three shipped world writable. The permissions should be 644 on all three The /etc/aliases, /etc/aliases.dir and /etc/aliases.pag files should not

Code [perm007f]

The /etc/aliases, /etc/aliases.dir and /etc/aliases.pag files should not be writable by non-root users. On SunOS 4 systems, these files are shipped world writable. The permissions should be 644 on all three The /etc/aliases, /etc/aliases.dir and /etc/aliases.pag files should not

Code [perm007f]

be writable by non-root users. On SunOS 4 systems, these files are












files. If left writable, program aliases can be added which can

Code [perm008w]

be writable by non-root users. On SunOS 4 systems, these files are

Code [perm007f]

Code [perm007f]

shipped world writable. The permissions should be 644 on all three shipped world writable. The permissions should be 644 on all three shipped world writable. The permissions should be 644 on all three The /etc/exports (or equivalent) file should not be writable by anyone files. If left writable, program aliases can be added which can shipped world writable. The permissions should be 644 on all three shipped world writable. The permissions should be 644 on all three

Code [perm008w]

allow unauthorized access. files. If left writable, program aliases can be added which can The /etc/aliases, /etc/aliases.dir and /etc/aliases.pag files should not allow unauthorized access. be writable by non-root users. On SunOS 4 systems, these files are files. If left writable, program aliases can be added which can allow unauthorized access. The /etc/aliases, /etc/aliases.dir and /etc/aliases.pag files should not shipped world writable. The permissions should be 644 on all three The /etc/aliases, /etc/aliases.dir and /etc/aliases.pag files should not files. If left writable, program aliases can be added which can files. If left writable, program aliases can be added which can be writable by non-root users. On SunOS 4 systems, these files are The /etc/aliases, /etc/aliases.dir and /etc/aliases.pag files should not be writable by non-root users. On SunOS 4 systems, these files are be writable by non-root users. On SunOS 4 systems, these files are shipped world writable. The permissions should be 644 on all three

Code [perm007f]

The /etc/aliases, /etc/aliases.dir and /etc/aliases.pag files should not files. If left writable, program aliases can be added which can shipped world writable. The permissions should be 644 on all three allow unauthorized access. be writable by non-root users. On SunOS 4 systems, these files are The /etc/aliases, /etc/aliases.dir and /etc/aliases.pag files should not shipped world writable. The permissions should be 644 on all three The /etc/exports (or equivalent) file should not be writable by anyone files. If left writable, program aliases can be added which can files. If left writable, program aliases can be added which can allow unauthorized access. The /etc/aliases, /etc/aliases.dir and /etc/aliases.pag files should not other than root. If a non-root user can modify the file, unauthorized files. If left writable, program aliases can be added which can files. If left writable, program aliases can be added which can allow unauthorized access.












The /etc/exports (or equivalent) file should not be writable by anyone files. If left writable, program aliases can be added which can allow unauthorized access. be writable by non-root users. On SunOS 4 systems, these files are shipped world writable. The permissions should be 644 on all three be writable by non-root users. On SunOS 4 systems, these files are






















files. If left writable, program aliases can be added which can shipped world writable. The permissions should be 644 on all three allow unauthorized access. allow unauthorized access. be writable by non-root users. On SunOS 4 systems, these files are shipped world writable. The permissions should be 644 on all three shipped world writable. The permissions should be 644 on all three The /etc/aliases, /etc/aliases.dir and /etc/aliases.pag files should not be writable by non-root users. On SunOS 4 systems, these files are files. If left writable, program aliases can be added which can be writable by non-root users. On SunOS 4 systems, these files are allow unauthorized access. files. If left writable, program aliases can be added which can shipped world writable. The permissions should be 644 on all three be writable by non-root users. On SunOS 4 systems, these files are











allow unauthorized access. other than root. If a non-root user can modify the file, unauthorized files. If left writable, program aliases can be added which can allow unauthorized access. privileges can be obtained. There is also no reason for this file be writable by non-root users. On SunOS 4 systems, these files are











Code [perm008w]

allow unauthorized access.

other than root. If a non-root user can modify the file, unauthorized










Code [perm008w]


allow unauthorized access. shipped world writable. The permissions should be 644 on all three
allow unauthorized access.











Code [perm008w]

files. If left writable, program aliases can be added which can shipped world writable. The permissions should be 644 on all three allow unauthorized access. files. If left writable, program aliases can be added which can












shipped world writable. The permissions should be 644 on all three











files. If left writable, program aliases can be added which can allow unauthorized access. shipped world writable. The permissions should be 644 on all three be writable by non-root users. On SunOS 4 systems, these files are files. If left writable, program aliases can be added which can shipped world writable. The permissions should be 644 on all three

Code [perm008w]

allow unauthorized access.






files. If left writable, program aliases can be added which can






shipped world writable. The permissions should be 644 on all three











privileges can be obtained. There is also no reason for this file allow unauthorized access.

Code [perm008w]

shipped world writable. The permissions should be 644 on all three

to be readable by anyone other than root. Making it unreadable, reduces











Code [perm008w]




The /etc/exports (or equivalent) file should not be writable by anyone





Code [perm008w]


The /etc/exports (or equivalent) file should not be writable by anyone privileges can be obtained. There is also no reason for this file





files. If left writable, program aliases can be added which can

















The /etc/exports (or equivalent) file should not be writable by anyone allow unauthorized access. files. If left writable, program aliases can be added which can

Code [perm008w]

Code [perm008w]

allow unauthorized access.












files. If left writable, program aliases can be added which can

Code [perm008w]

allow unauthorized access. shipped world writable. The permissions should be 644 on all three files. If left writable, program aliases can be added which can files. If left writable, program aliases can be added which can allow unauthorized access.

Code [perm008w]














The /etc/exports (or equivalent) file should not be writable by anyone



allow unauthorized access.






files. If left writable, program aliases can be added which can The /etc/exports (or equivalent) file should not be writable by anyone

Code [perm008w]









to be readable by anyone other than root. Making it unreadable, reduces



the information available to an intruder attempting to gain privileged files. If left writable, program aliases can be added which can The /etc/exports (or equivalent) file should not be writable by anyone

Code [perm008w]

Code [perm008w]

The /etc/exports (or equivalent) file should not be writable by anyone

Code [perm008w]

other than root. If a non-root user can modify the file, unauthorized other than root. If a non-root user can modify the file, unauthorized allow unauthorized access. other than root. If a non-root user can modify the file, unauthorized to be readable by anyone other than root. Making it unreadable, reduces allow unauthorized access.

The /etc/exports (or equivalent) file should not be writable by anyone





















Code [perm008w]

The /etc/exports (or equivalent) file should not be writable by anyone allow unauthorized access. The /etc/exports (or equivalent) file should not be writable by anyone

Code [perm008w]

files. If left writable, program aliases can be added which can














allow unauthorized access.

Code [perm008w]

The /etc/exports (or equivalent) file should not be writable by anyone other than root. If a non-root user can modify the file, unauthorized









allow unauthorized access.



Code [perm008w]

allow unauthorized access. other than root. If a non-root user can modify the file, unauthorized The /etc/exports (or equivalent) file should not be writable by anyone the information available to an intruder attempting to gain privileged allow unauthorized access. other than root. If a non-root user can modify the file, unauthorized access. privileges can be obtained. There is also no reason for this file other than root. If a non-root user can modify the file, unauthorized The /etc/exports (or equivalent) file should not be writable by anyone The /etc/exports (or equivalent) file should not be writable by anyone privileges can be obtained. There is also no reason for this file

Code [perm008w]

Code [perm008w]



The /etc/exports (or equivalent) file should not be writable by anyone









privileges can be obtained. There is also no reason for this file other than root. If a non-root user can modify the file, unauthorized the information available to an intruder attempting to gain privileged











The /etc/exports (or equivalent) file should not be writable by anyone

Code [perm008w]

Code [perm008w]

other than root. If a non-root user can modify the file, unauthorized












The /etc/exports (or equivalent) file should not be writable by anyone other than root. If a non-root user can modify the file, unauthorized allow unauthorized access.

Code [perm008w]

The /etc/exports (or equivalent) file should not be writable by anyone other than root. If a non-root user can modify the file, unauthorized












privileges can be obtained. There is also no reason for this file











The /etc/exports (or equivalent) file should not be writable by anyone











privileges can be obtained. There is also no reason for this file other than root. If a non-root user can modify the file, unauthorized











access.







privileges can be obtained. There is also no reason for this file




Code [perm008w]

to be readable by anyone other than root. Making it unreadable, reduces other than root. If a non-root user can modify the file, unauthorized The /etc/exports (or equivalent) file should not be writable by anyone privileges can be obtained. There is also no reason for this file The /etc/exports (or equivalent) file should not be writable by anyone other than root. If a non-root user can modify the file, unauthorized to be readable by anyone other than root. Making it unreadable, reduces other than root. If a non-root user can modify the file, unauthorized

Code [perm008w]

to be readable by anyone other than root. Making it unreadable, reduces

Code [perm008w]

access. privileges can be obtained. There is also no reason for this file The /etc/exports (or equivalent) file should not be writable by anyone The /etc/exports (or equivalent) file should not be writable by anyone privileges can be obtained. There is also no reason for this file other than root. If a non-root user can modify the file, unauthorized other than root. If a non-root user can modify the file, unauthorized

Code [perm008w]


The /etc/exports (or equivalent) file should not be writable by anyone privileges can be obtained. There is also no reason for this file other than root. If a non-root user can modify the file, unauthorized privileges can be obtained. There is also no reason for this file to be readable by anyone other than root. Making it unreadable, reduces

Code [perm008w]

other than root. If a non-root user can modify the file, unauthorized

Code [perm008w]

Code [perm008w]

to be readable by anyone other than root. Making it unreadable, reduces

Code [perm009f]

privileges can be obtained. There is also no reason for this file to be readable by anyone other than root. Making it unreadable, reduces












the information available to an intruder attempting to gain privileged The /etc/exports (or equivalent) file should not be writable by anyone to be readable by anyone other than root. Making it unreadable, reduces privileges can be obtained. There is also no reason for this file other than root. If a non-root user can modify the file, unauthorized other than root. If a non-root user can modify the file, unauthorized privileges can be obtained. There is also no reason for this file the information available to an intruder attempting to gain privileged privileges can be obtained. There is also no reason for this file The /etc/exports (or equivalent) file should not be writable by anyone











The /etc/exports (or equivalent) file should not be writable by anyone the information available to an intruder attempting to gain privileged to be readable by anyone other than root. Making it unreadable, reduces other than root. If a non-root user can modify the file, unauthorized to be readable by anyone other than root. Making it unreadable, reduces other than root. If a non-root user can modify the file, unauthorized privileges can be obtained. There is also no reason for this file

Code [perm008w]

privileges can be obtained. There is also no reason for this file privileges can be obtained. There is also no reason for this file to be readable by anyone other than root. Making it unreadable, reduces The /etc/exports (or equivalent) file should not be writable by anyone other than root. If a non-root user can modify the file, unauthorized to be readable by anyone other than root. Making it unreadable, reduces The /etc/exports (or equivalent) file should not be writable by anyone the information available to an intruder attempting to gain privileged The /etc/exports (or equivalent) file should not be writable by anyone privileges can be obtained. There is also no reason for this file The /etc/group file should not be writable by anyone other than root.

Code [perm009f]

The /etc/exports (or equivalent) file should not be writable by anyone to be readable by anyone other than root. Making it unreadable, reduces the information available to an intruder attempting to gain privileged the information available to an intruder attempting to gain privileged other than root. If a non-root user can modify the file, unauthorized the information available to an intruder attempting to gain privileged access. access. privileges can be obtained. There is also no reason for this file privileges can be obtained. There is also no reason for this file to be readable by anyone other than root. Making it unreadable, reduces to be readable by anyone other than root. Making it unreadable, reduces

Code [perm009f]

to be readable by anyone other than root. Making it unreadable, reduces other than root. If a non-root user can modify the file, unauthorized access. other than root. If a non-root user can modify the file, unauthorized the information available to an intruder attempting to gain privileged the information available to an intruder attempting to gain privileged privileges can be obtained. There is also no reason for this file privileges can be obtained. There is also no reason for this file to be readable by anyone other than root. Making it unreadable, reduces The /etc/exports (or equivalent) file should not be writable by anyone to be readable by anyone other than root. Making it unreadable, reduces privileges can be obtained. There is also no reason for this file other than root. If a non-root user can modify the file, unauthorized the information available to an intruder attempting to gain privileged to be readable by anyone other than root. Making it unreadable, reduces other than root. If a non-root user can modify the file, unauthorized access. the information available to an intruder attempting to gain privileged other than root. If a non-root user can modify the file, unauthorized other than root. If a non-root user can modify the file, unauthorized the information available to an intruder attempting to gain privileged to be readable by anyone other than root. Making it unreadable, reduces The /etc/group file should not be writable by anyone other than root. If a non-root user can modify the file, unauthorized privileges can access. access. privileges can be obtained. There is also no reason for this file access.























to be readable by anyone other than root. Making it unreadable, reduces the information available to an intruder attempting to gain privileged the information available to an intruder attempting to gain privileged The /etc/group file should not be writable by anyone other than root. to be readable by anyone other than root. Making it unreadable, reduces











privileges can be obtained. There is also no reason for this file the information available to an intruder attempting to gain privileged privileges can be obtained. There is also no reason for this file access. access. the information available to an intruder attempting to gain privileged the information available to an intruder attempting to gain privileged to be readable by anyone other than root. Making it unreadable, reduces other than root. If a non-root user can modify the file, unauthorized access. to be readable by anyone other than root. Making it unreadable, reduces to be readable by anyone other than root. Making it unreadable, reduces the information available to an intruder attempting to gain privileged privileges can be obtained. There is also no reason for this file privileges can be obtained. There is also no reason for this file











access. the information available to an intruder attempting to gain privileged privileges can be obtained. There is also no reason for this file If a non-root user can modify the file, unauthorized privileges can be obtained. privileges can be obtained. There is also no reason for this file access.

Code [perm009f]

Code [perm009f]























to be readable by anyone other than root. Making it unreadable, reduces











the information available to an intruder attempting to gain privileged access.

Code [perm009f]

access. to be readable by anyone other than root. Making it unreadable, reduces If a non-root user can modify the file, unauthorized privileges can access. the information available to an intruder attempting to gain privileged to be readable by anyone other than root. Making it unreadable, reduces access. privileges can be obtained. There is also no reason for this file










the information available to an intruder attempting to gain privileged




the information available to an intruder attempting to gain privileged access.







the information available to an intruder attempting to gain privileged




Code [perm009f]

access. to be readable by anyone other than root. Making it unreadable, reduces to be readable by anyone other than root. Making it unreadable, reduces












access.










Code [perm009f]













be obtained. to be readable by anyone other than root. Making it unreadable, reduces

Code [perm009f]

Code [perm009f]

to be readable by anyone other than root. Making it unreadable, reduces the information available to an intruder attempting to gain privileged The /etc/group file should not be writable by anyone other than root. access. The /etc/group file should not be writable by anyone other than root. The /etc/group file should not be writable by anyone other than root.












the information available to an intruder attempting to gain privileged











be obtained.











the information available to an intruder attempting to gain privileged access.

Code [perm009f]

Code [perm009f]


Code [perm009f]


access. access.





access.






the information available to an intruder attempting to gain privileged

Code [perm009f]

to be readable by anyone other than root. Making it unreadable, reduces The /etc/group file should not be writable by anyone other than root.












Code [perm010w]

the information available to an intruder attempting to gain privileged

Code [perm009f]













The /etc/group file should not be writable by anyone other than root.

The /etc/group file should not be writable by anyone other than root. the information available to an intruder attempting to gain privileged The /etc/group file should not be writable by anyone other than root. If a non-root user can modify the file, unauthorized privileges can access.











Code [perm009f]

the information available to an intruder attempting to gain privileged

Code [perm009f]

If a non-root user can modify the file, unauthorized privileges can

Code [perm009f]

access. If a non-root user can modify the file, unauthorized privileges can












access.











Code [perm009f]

The /etc/group file should not be writable by anyone other than root.

Code [perm009f]

The /etc/group file should not be writable by anyone other than root. The /etc/group file should not be writable by anyone other than root.








Code [perm009f]













access. The /etc/group file should not be writable by anyone other than root. the information available to an intruder attempting to gain privileged











The /etc/hosts.allow and /etc/hosts.deny files (from Wietse Venema's

Code [perm009f]

If a non-root user can modify the file, unauthorized privileges can access.

Code [perm010w]

The /etc/group file should not be writable by anyone other than root. If a non-root user can modify the file, unauthorized privileges can

Code [perm009f]

If a non-root user can modify the file, unauthorized privileges can be obtained. If a non-root user can modify the file, unauthorized privileges can access.












be obtained. The /etc/group file should not be writable by anyone other than root. access. The /etc/group file should not be writable by anyone other than root. The /etc/group file should not be writable by anyone other than root.

Code [perm009f]








be obtained.




Code [perm010w]












If a non-root user can modify the file, unauthorized privileges can The /etc/group file should not be writable by anyone other than root.

Code [perm009f]

If a non-root user can modify the file, unauthorized privileges can The /etc/group file should not be writable by anyone other than root.

Code [perm009f]

If a non-root user can modify the file, unauthorized privileges can












If a non-root user can modify the file, unauthorized privileges can

Code [perm009f]

The /etc/group file should not be writable by anyone other than root. access.

The /etc/group file should not be writable by anyone other than root.











be obtained. tcp_wrapper package) should not be writable by non-root users. If The /etc/hosts.allow and /etc/hosts.deny files (from Wietse Venema's If a non-root user can modify the file, unauthorized privileges can be obtained. be obtained.



The /etc/group file should not be writable by anyone other than root.








be obtained.











Code [perm009f]

Code [perm009f]


If a non-root user can modify the file, unauthorized privileges can





















If a non-root user can modify the file, unauthorized privileges can

Code [perm009f]

If a non-root user can modify the file, unauthorized privileges can The /etc/group file should not be writable by anyone other than root.









The /etc/hosts.allow and /etc/hosts.deny files (from Wietse Venema's



be obtained.

Code [perm009f]

If a non-root user can modify the file, unauthorized privileges can The /etc/group file should not be writable by anyone other than root. be obtained. If a non-root user can modify the file, unauthorized privileges can The /etc/group file should not be writable by anyone other than root. be obtained. The /etc/group file should not be writable by anyone other than root.



Code [perm009f]


If a non-root user can modify the file, unauthorized privileges can be obtained. If a non-root user can modify the file, unauthorized privileges can


they are writable, the protection provided by the package can be









Code [perm009f]

tcp_wrapper package) should not be writable by non-root users. If












be obtained. If a non-root user can modify the file, unauthorized privileges can

Code [perm010w]

Code [perm009f]

Code [perm010w]























The /etc/group file should not be writable by anyone other than root.

Code [perm010w]

be obtained. The /etc/group file should not be writable by anyone other than root. If a non-root user can modify the file, unauthorized privileges can be obtained. The /etc/group file should not be writable by anyone other than root. be obtained. tcp_wrapper package) should not be writable by non-root users. If












The /etc/group file should not be writable by anyone other than root. be obtained. If a non-root user can modify the file, unauthorized privileges can











If a non-root user can modify the file, unauthorized privileges can be obtained.

Code [perm009f]












If a non-root user can modify the file, unauthorized privileges can











be obtained. be obtained.

Code [perm010w]

Code [perm010w]

The /etc/group file should not be writable by anyone other than root.

Code [perm010w]

bypassed. In addition, if all of the daemons protected by tcp_wrapper

Code [perm010w]












they are writable, the protection provided by the package can be be obtained. The /etc/hosts.allow and /etc/hosts.deny files (from Wietse Venema's The /etc/group file should not be writable by anyone other than root. The /etc/hosts.allow and /etc/hosts.deny files (from Wietse Venema's The /etc/group file should not be writable by anyone other than root. If a non-root user can modify the file, unauthorized privileges can











If a non-root user can modify the file, unauthorized privileges can If a non-root user can modify the file, unauthorized privileges can The /etc/hosts.allow and /etc/hosts.deny files (from Wietse Venema's they are writable, the protection provided by the package can be











be obtained.











Code [perm010w]

Code [perm010w]












If a non-root user can modify the file, unauthorized privileges can

Code [perm010w]

be obtained.











The /etc/group file should not be writable by anyone other than root.

Code [perm010w]

be obtained. be obtained.



The /etc/hosts.allow and /etc/hosts.deny files (from Wietse Venema's









The /etc/hosts.allow and /etc/hosts.deny files (from Wietse Venema's











Code [perm010w]





If a non-root user can modify the file, unauthorized privileges can







run as `root', then the file does not need to be readable by non-root The /etc/hosts.allow and /etc/hosts.deny files (from Wietse Venema's tcp_wrapper package) should not be writable by non-root users. If The /etc/hosts.allow and /etc/hosts.deny files (from Wietse Venema's

Code [perm010w]

If a non-root user can modify the file, unauthorized privileges can If a non-root user can modify the file, unauthorized privileges can be obtained.

Code [perm010w]

Code [perm010w]

be obtained. bypassed. In addition, if all of the daemons protected by tcp_wrapper tcp_wrapper package) should not be writable by non-root users. If be obtained. bypassed. In addition, if all of the daemons protected by tcp_wrapper












tcp_wrapper package) should not be writable by non-root users. If The /etc/hosts.allow and /etc/hosts.deny files (from Wietse Venema's

Code [perm010w]

The /etc/hosts.allow and /etc/hosts.deny files (from Wietse Venema's

Code [perm010w]

be obtained. The /etc/hosts.allow and /etc/hosts.deny files (from Wietse Venema's If a non-root user can modify the file, unauthorized privileges can The /etc/hosts.allow and /etc/hosts.deny files (from Wietse Venema's











Code [perm010w]














Code [perm010w]

tcp_wrapper package) should not be writable by non-root users. If tcp_wrapper package) should not be writable by non-root users. If

Code [perm010w]

The /etc/hosts.allow and /etc/hosts.deny files (from Wietse Venema's tcp_wrapper package) should not be writable by non-root users. If be obtained. users. Making the permissions 600, reduces the information available they are writable, the protection provided by the package can be tcp_wrapper package) should not be writable by non-root users. If be obtained.







The /etc/hosts.allow and /etc/hosts.deny files (from Wietse Venema's





Code [perm010w]

The /etc/hosts.allow and /etc/hosts.deny files (from Wietse Venema's run as `root', then the file does not need to be readable by non-root be obtained.









they are writable, the protection provided by the package can be










they are writable, the protection provided by the package can be tcp_wrapper package) should not be writable by non-root users. If run as `root', then the file does not need to be readable by non-root The /etc/hosts.allow and /etc/hosts.deny files (from Wietse Venema's tcp_wrapper package) should not be writable by non-root users. If The /etc/hosts.allow and /etc/hosts.deny files (from Wietse Venema's









The /etc/hosts.allow and /etc/hosts.deny files (from Wietse Venema's


Code [perm010w]

be obtained.

Code [perm010w]

tcp_wrapper package) should not be writable by non-root users. If

Code [perm010w]

tcp_wrapper package) should not be writable by non-root users. If The /etc/hosts.allow and /etc/hosts.deny files (from Wietse Venema's they are writable, the protection provided by the package can be The /etc/hosts.allow and /etc/hosts.deny files (from Wietse Venema's they are writable, the protection provided by the package can be tcp_wrapper package) should not be writable by non-root users. If












to an intruder attempting to gain privileges. If any daemons are they are writable, the protection provided by the package can be The /etc/hosts.allow and /etc/hosts.deny files (from Wietse Venema's

Code [perm010w]









bypassed. In addition, if all of the daemons protected by tcp_wrapper



Code [perm010w]

Code [perm010w]

bypassed. In addition, if all of the daemons protected by tcp_wrapper they are writable, the protection provided by the package can be The /etc/hosts.allow and /etc/hosts.deny files (from Wietse Venema's users. Making the permissions 600, reduces the information available tcp_wrapper package) should not be writable by non-root users. If they are writable, the protection provided by the package can be tcp_wrapper package) should not be writable by non-root users. If


bypassed. In addition, if all of the daemons protected by tcp_wrapper










users. Making the permissions 600, reduces the information available tcp_wrapper package) should not be writable by non-root users. If

Code [perm010w]

tcp_wrapper package) should not be writable by non-root users. If tcp_wrapper package) should not be writable by non-root users. If they are writable, the protection provided by the package can be The /etc/hosts.allow and /etc/hosts.deny files (from Wietse Venema's












they are writable, the protection provided by the package can be The /etc/hosts.allow and /etc/hosts.deny files (from Wietse Venema's The /etc/hosts.allow and /etc/hosts.deny files (from Wietse Venema's tcp_wrapper package) should not be writable by non-root users. If tcp_wrapper package) should not be writable by non-root users. If bypassed. In addition, if all of the daemons protected by tcp_wrapper

Code [perm010w]

they are writable, the protection provided by the package can be they are writable, the protection provided by the package can be bypassed. In addition, if all of the daemons protected by tcp_wrapper tcp_wrapper package) should not be writable by non-root users. If bypassed. In addition, if all of the daemons protected by tcp_wrapper run as `root', then the file does not need to be readable by non-root

Code [perm010w]

The /etc/hosts.allow and /etc/hosts.deny files (from Wietse Venema's The /etc/hosts.allow and /etc/hosts.deny files (from Wietse Venema's

Code [perm010w]

run as non-root users though, this is not possible. run as `root', then the file does not need to be readable by non-root The /etc/hosts.allow and /etc/hosts.deny files (from Wietse Venema's tcp_wrapper package) should not be writable by non-root users. If to an intruder attempting to gain privileges. If any daemons are bypassed. In addition, if all of the daemons protected by tcp_wrapper run as `root', then the file does not need to be readable by non-root to an intruder attempting to gain privileges. If any daemons are they are writable, the protection provided by the package can be bypassed. In addition, if all of the daemons protected by tcp_wrapper they are writable, the protection provided by the package can be they are writable, the protection provided by the package can be The /etc/hosts.allow and /etc/hosts.deny files (from Wietse Venema's they are writable, the protection provided by the package can be they are writable, the protection provided by the package can be tcp_wrapper package) should not be writable by non-root users. If bypassed. In addition, if all of the daemons protected by tcp_wrapper bypassed. In addition, if all of the daemons protected by tcp_wrapper

Code [perm010w]

tcp_wrapper package) should not be writable by non-root users. If tcp_wrapper package) should not be writable by non-root users. If they are writable, the protection provided by the package can be they are writable, the protection provided by the package can be run as `root', then the file does not need to be readable by non-root The /etc/hosts.allow and /etc/hosts.deny files (from Wietse Venema's bypassed. In addition, if all of the daemons protected by tcp_wrapper run as `root', then the file does not need to be readable by non-root bypassed. In addition, if all of the daemons protected by tcp_wrapper they are writable, the protection provided by the package can be run as `root', then the file does not need to be readable by non-root users. Making the permissions 600, reduces the information available The /etc/hosts.allow and /etc/hosts.deny files (from Wietse Venema's tcp_wrapper package) should not be writable by non-root users. If tcp_wrapper package) should not be writable by non-root users. If tcp_wrapper package) should not be writable by non-root users. If users. Making the permissions 600, reduces the information available The /etc/hosts.allow and /etc/hosts.deny files (from Wietse Venema's they are writable, the protection provided by the package can be






bypassed. In addition, if all of the daemons protected by tcp_wrapper






run as non-root users though, this is not possible. run as non-root users though, this is not possible. run as `root', then the file does not need to be readable by non-root users. Making the permissions 600, reduces the information available run as `root', then the file does not need to be readable by non-root bypassed. In addition, if all of the daemons protected by tcp_wrapper bypassed. In addition, if all of the daemons protected by tcp_wrapper tcp_wrapper package) should not be writable by non-root users. If bypassed. In addition, if all of the daemons protected by tcp_wrapper bypassed. In addition, if all of the daemons protected by tcp_wrapper run as `root', then the file does not need to be readable by non-root The /etc/hosts.allow and /etc/hosts.deny files (from Wietse Venema's they are writable, the protection provided by the package can be they are writable, the protection provided by the package can be they are writable, the protection provided by the package can be bypassed. In addition, if all of the daemons protected by tcp_wrapper run as `root', then the file does not need to be readable by non-root users. Making the permissions 600, reduces the information available tcp_wrapper package) should not be writable by non-root users. If bypassed. In addition, if all of the daemons protected by tcp_wrapper run as `root', then the file does not need to be readable by non-root bypassed. In addition, if all of the daemons protected by tcp_wrapper run as `root', then the file does not need to be readable by non-root to an intruder attempting to gain privileges. If any daemons are users. Making the permissions 600, reduces the information available tcp_wrapper package) should not be writable by non-root users. If users. Making the permissions 600, reduces the information available they are writable, the protection provided by the package can be they are writable, the protection provided by the package can be

Code [perm011w]

run as `root', then the file does not need to be readable by non-root tcp_wrapper package) should not be writable by non-root users. If to an intruder attempting to gain privileges. If any daemons are they are writable, the protection provided by the package can be bypassed. In addition, if all of the daemons protected by tcp_wrapper





to an intruder attempting to gain privileges. If any daemons are







users. Making the permissions 600, reduces the information available run as `root', then the file does not need to be readable by non-root they are writable, the protection provided by the package can be users. Making the permissions 600, reduces the information available





run as `root', then the file does not need to be readable by non-root






run as `root', then the file does not need to be readable by non-root run as `root', then the file does not need to be readable by non-root users. Making the permissions 600, reduces the information available bypassed. In addition, if all of the daemons protected by tcp_wrapper tcp_wrapper package) should not be writable by non-root users. If bypassed. In addition, if all of the daemons protected by tcp_wrapper users. Making the permissions 600, reduces the information available run as `root', then the file does not need to be readable by non-root bypassed. In addition, if all of the daemons protected by tcp_wrapper to an intruder attempting to gain privileges. If any daemons are run as `root', then the file does not need to be readable by non-root run as `root', then the file does not need to be readable by non-root users. Making the permissions 600, reduces the information available they are writable, the protection provided by the package can be bypassed. In addition, if all of the daemons protected by tcp_wrapper run as non-root users though, this is not possible. users. Making the permissions 600, reduces the information available they are writable, the protection provided by the package can be to an intruder attempting to gain privileges. If any daemons are to an intruder attempting to gain privileges. If any daemons are The /etc/hosts.equiv and /etc/hosts.lpd files define trusted hosts. bypassed. In addition, if all of the daemons protected by tcp_wrapper

Code [perm011w]

users. Making the permissions 600, reduces the information available they are writable, the protection provided by the package can be run as non-root users though, this is not possible.

Code [perm011w]

bypassed. In addition, if all of the daemons protected by tcp_wrapper run as `root', then the file does not need to be readable by non-root run as non-root users though, this is not possible. to an intruder attempting to gain privileges. If any daemons are to an intruder attempting to gain privileges. If any daemons are users. Making the permissions 600, reduces the information available bypassed. In addition, if all of the daemons protected by tcp_wrapper users. Making the permissions 600, reduces the information available users. Making the permissions 600, reduces the information available users. Making the permissions 600, reduces the information available they are writable, the protection provided by the package can be run as `root', then the file does not need to be readable by non-root to an intruder attempting to gain privileges. If any daemons are run as `root', then the file does not need to be readable by non-root to an intruder attempting to gain privileges. If any daemons are run as `root', then the file does not need to be readable by non-root users. Making the permissions 600, reduces the information available run as non-root users though, this is not possible. users. Making the permissions 600, reduces the information available to an intruder attempting to gain privileges. If any daemons are bypassed. In addition, if all of the daemons protected by tcp_wrapper run as `root', then the file does not need to be readable by non-root to an intruder attempting to gain privileges. If any daemons are


run as non-root users though, this is not possible.










bypassed. In addition, if all of the daemons protected by tcp_wrapper users. Making the permissions 600, reduces the information available run as non-root users though, this is not possible. run as `root', then the file does not need to be readable by non-root The /etc/hosts.equiv and /etc/hosts.lpd files define trusted hosts. The hosts.equiv file defines the trusted hosts for the Berkeley 'R' bypassed. In addition, if all of the daemons protected by tcp_wrapper











to an intruder attempting to gain privileges. If any daemons are The /etc/hosts.equiv and /etc/hosts.lpd files define trusted hosts. run as `root', then the file does not need to be readable by non-root











to an intruder attempting to gain privileges. If any daemons are users. Making the permissions 600, reduces the information available run as non-root users though, this is not possible. run as non-root users though, this is not possible. run as `root', then the file does not need to be readable by non-root to an intruder attempting to gain privileges. If any daemons are to an intruder attempting to gain privileges. If any daemons are to an intruder attempting to gain privileges. If any daemons are bypassed. In addition, if all of the daemons protected by tcp_wrapper users. Making the permissions 600, reduces the information available run as non-root users though, this is not possible. run as non-root users though, this is not possible. users. Making the permissions 600, reduces the information available users. Making the permissions 600, reduces the information available










to an intruder attempting to gain privileges. If any daemons are

run as non-root users though, this is not possible.

Code [perm011w]

to an intruder attempting to gain privileges. If any daemons are run as `root', then the file does not need to be readable by non-root users. Making the permissions 600, reduces the information available












run as non-root users though, this is not possible. run as `root', then the file does not need to be readable by non-root to an intruder attempting to gain privileges. If any daemons are

Code [perm011w]

run as `root', then the file does not need to be readable by non-root users. Making the permissions 600, reduces the information available commands (rsh, rlogin), while the hosts.lpd file defines trusted hosts run as non-root users though, this is not possible. The hosts.equiv file defines the trusted hosts for the Berkeley 'R'












Code [perm011w]

The hosts.equiv file defines the trusted hosts for the Berkeley 'R' users. Making the permissions 600, reduces the information available












to an intruder attempting to gain privileges. If any daemons are run as non-root users though, this is not possible.




users. Making the permissions 600, reduces the information available







run as non-root users though, this is not possible. run as non-root users though, this is not possible. run as `root', then the file does not need to be readable by non-root run as non-root users though, this is not possible. to an intruder attempting to gain privileges. If any daemons are




Code [perm011w]


to an intruder attempting to gain privileges. If any daemons are to an intruder attempting to gain privileges. If any daemons are











run as non-root users though, this is not possible.

Code [perm011w]

run as non-root users though, this is not possible.












users. Making the permissions 600, reduces the information available The /etc/hosts.equiv and /etc/hosts.lpd files define trusted hosts.


users. Making the permissions 600, reduces the information available



to an intruder attempting to gain privileges. If any daemons are






run as non-root users though, this is not possible.

Code [perm011w]

The /etc/hosts.equiv and /etc/hosts.lpd files define trusted hosts. to an intruder attempting to gain privileges. If any daemons are users. Making the permissions 600, reduces the information available

Code [perm011w]

for the print system. If the hosts.equiv or hosts.lpd file is writable commands (rsh, rlogin), while the hosts.lpd file defines trusted hosts












commands (rsh, rlogin), while the hosts.lpd file defines trusted hosts

Code [perm011w]

The /etc/hosts.equiv and /etc/hosts.lpd files define trusted hosts. to an intruder attempting to gain privileges. If any daemons are















to an intruder attempting to gain privileges. If any daemons are








run as non-root users though, this is not possible.






















users. Making the permissions 600, reduces the information available

Code [perm011w]

Code [perm011w]

run as non-root users though, this is not possible. The /etc/hosts.equiv and /etc/hosts.lpd files define trusted hosts. run as non-root users though, this is not possible. run as non-root users though, this is not possible.












Code [perm011w]












Code [perm011w]

The /etc/hosts.equiv and /etc/hosts.lpd files define trusted hosts. The hosts.equiv file defines the trusted hosts for the Berkeley 'R' to an intruder attempting to gain privileges. If any daemons are run as non-root users though, this is not possible. to an intruder attempting to gain privileges. If any daemons are












Code [perm011w]

The hosts.equiv file defines the trusted hosts for the Berkeley 'R' run as non-root users though, this is not possible. by users other than root, then unauthorized privileges or access may to an intruder attempting to gain privileges. If any daemons are The /etc/hosts.equiv and /etc/hosts.lpd files define trusted hosts. The /etc/hosts.equiv and /etc/hosts.lpd files define trusted hosts. for the print system. If the hosts.equiv or hosts.lpd file is writable for the print system. If the hosts.equiv or hosts.lpd file is writable The /etc/hosts.equiv and /etc/hosts.lpd files define trusted hosts. run as non-root users though, this is not possible.

Code [perm011w]

Code [perm011w]

Code [perm011w]

The hosts.equiv file defines the trusted hosts for the Berkeley 'R'

Code [perm011w]

run as non-root users though, this is not possible.












The hosts.equiv file defines the trusted hosts for the Berkeley 'R' The /etc/hosts.equiv and /etc/hosts.lpd files define trusted hosts.

The /etc/hosts.equiv and /etc/hosts.lpd files define trusted hosts.












to an intruder attempting to gain privileges. If any daemons are

Code [perm011w]












Code [perm011w]

The /etc/hosts.equiv and /etc/hosts.lpd files define trusted hosts. The hosts.equiv file defines the trusted hosts for the Berkeley 'R' The /etc/hosts.equiv and /etc/hosts.lpd files define trusted hosts.

Code [perm011w]

run as non-root users though, this is not possible.












commands (rsh, rlogin), while the hosts.lpd file defines trusted hosts run as non-root users though, this is not possible. The /etc/hosts.equiv and /etc/hosts.lpd files define trusted hosts.











commands (rsh, rlogin), while the hosts.lpd file defines trusted hosts run as non-root users though, this is not possible. by users other than root, then unauthorized privileges or access may The hosts.equiv file defines the trusted hosts for the Berkeley 'R' The hosts.equiv file defines the trusted hosts for the Berkeley 'R' by users other than root, then unauthorized privileges or access may be gained. In addition, there is no reason for non-root users to be The /etc/hosts.equiv and /etc/hosts.lpd files define trusted hosts. The hosts.equiv file defines the trusted hosts for the Berkeley 'R' commands (rsh, rlogin), while the hosts.lpd file defines trusted hosts






Code [perm011w]

Code [perm011w]


The /etc/hosts.equiv and /etc/hosts.lpd files define trusted hosts. The /etc/hosts.equiv and /etc/hosts.lpd files define trusted hosts. The /etc/hosts.equiv and /etc/hosts.lpd files define trusted hosts.

Code [perm011w]












The hosts.equiv file defines the trusted hosts for the Berkeley 'R' commands (rsh, rlogin), while the hosts.lpd file defines trusted hosts run as non-root users though, this is not possible.

Code [perm011w]

The /etc/hosts.equiv and /etc/hosts.lpd files define trusted hosts. The /etc/hosts.equiv and /etc/hosts.lpd files define trusted hosts.

Code [perm011w]

The hosts.equiv file defines the trusted hosts for the Berkeley 'R' The hosts.equiv file defines the trusted hosts for the Berkeley 'R'





The hosts.equiv file defines the trusted hosts for the Berkeley 'R'







for the print system. If the hosts.equiv or hosts.lpd file is writable The /etc/hosts.equiv and /etc/hosts.lpd files define trusted hosts. commands (rsh, rlogin), while the hosts.lpd file defines trusted hosts

Code [perm011w]












commands (rsh, rlogin), while the hosts.lpd file defines trusted hosts









The hosts.equiv file defines the trusted hosts for the Berkeley 'R'


for the print system. If the hosts.equiv or hosts.lpd file is writable

Code [perm011w]

be gained. In addition, there is no reason for non-root users to be be gained. In addition, there is no reason for non-root users to be commands (rsh, rlogin), while the hosts.lpd file defines trusted hosts The hosts.equiv file defines the trusted hosts for the Berkeley 'R' able to read these files. Making them unreadable reduces the information for the print system. If the hosts.equiv or hosts.lpd file is writable The /etc/hosts.equiv and /etc/hosts.lpd files define trusted hosts.

Code [perm011w]

The hosts.equiv file defines the trusted hosts for the Berkeley 'R' The hosts.equiv file defines the trusted hosts for the Berkeley 'R' commands (rsh, rlogin), while the hosts.lpd file defines trusted hosts The /etc/hosts.equiv and /etc/hosts.lpd files define trusted hosts. commands (rsh, rlogin), while the hosts.lpd file defines trusted hosts The hosts.equiv file defines the trusted hosts for the Berkeley 'R' The /etc/hosts.equiv and /etc/hosts.lpd files define trusted hosts.












for the print system. If the hosts.equiv or hosts.lpd file is writable The /etc/hosts.equiv and /etc/hosts.lpd files define trusted hosts. The hosts.equiv file defines the trusted hosts for the Berkeley 'R' The hosts.equiv file defines the trusted hosts for the Berkeley 'R'

Code [perm011w]

The /etc/hosts.equiv and /etc/hosts.lpd files define trusted hosts. commands (rsh, rlogin), while the hosts.lpd file defines trusted hosts by users other than root, then unauthorized privileges or access may commands (rsh, rlogin), while the hosts.lpd file defines trusted hosts

Code [perm011w]

The hosts.equiv file defines the trusted hosts for the Berkeley 'R' commands (rsh, rlogin), while the hosts.lpd file defines trusted hosts for the print system. If the hosts.equiv or hosts.lpd file is writable The /etc/hosts.equiv and /etc/hosts.lpd files define trusted hosts.

Code [perm011w]

for the print system. If the hosts.equiv or hosts.lpd file is writable commands (rsh, rlogin), while the hosts.lpd file defines trusted hosts able to read these files. Making them unreadable reduces the information The /etc/hosts.equiv and /etc/hosts.lpd files define trusted hosts. commands (rsh, rlogin), while the hosts.lpd file defines trusted hosts able to read these files. Making them unreadable reduces the information by users other than root, then unauthorized privileges or access may available to an intruder attempting to gain privileges. by users other than root, then unauthorized privileges or access may for the print system. If the hosts.equiv or hosts.lpd file is writable commands (rsh, rlogin), while the hosts.lpd file defines trusted hosts The /etc/hosts.equiv and /etc/hosts.lpd files define trusted hosts.

Code [perm011w]

The hosts.equiv file defines the trusted hosts for the Berkeley 'R' for the print system. If the hosts.equiv or hosts.lpd file is writable for the print system. If the hosts.equiv or hosts.lpd file is writable commands (rsh, rlogin), while the hosts.lpd file defines trusted hosts The hosts.equiv file defines the trusted hosts for the Berkeley 'R' commands (rsh, rlogin), while the hosts.lpd file defines trusted hosts The hosts.equiv file defines the trusted hosts for the Berkeley 'R' by users other than root, then unauthorized privileges or access may The hosts.equiv file defines the trusted hosts for the Berkeley 'R' commands (rsh, rlogin), while the hosts.lpd file defines trusted hosts commands (rsh, rlogin), while the hosts.lpd file defines trusted hosts The /etc/hosts.equiv and /etc/hosts.lpd files define trusted hosts. for the print system. If the hosts.equiv or hosts.lpd file is writable be gained. In addition, there is no reason for non-root users to be The /etc/hosts.equiv and /etc/hosts.lpd files define trusted hosts. commands (rsh, rlogin), while the hosts.lpd file defines trusted hosts for the print system. If the hosts.equiv or hosts.lpd file is writable by users other than root, then unauthorized privileges or access may The hosts.equiv file defines the trusted hosts for the Berkeley 'R' The hosts.equiv file defines the trusted hosts for the Berkeley 'R' for the print system. If the hosts.equiv or hosts.lpd file is writable The /etc/hosts.equiv and /etc/hosts.lpd files define trusted hosts. for the print system. If the hosts.equiv or hosts.lpd file is writable by users other than root, then unauthorized privileges or access may available to an intruder attempting to gain privileges. available to an intruder attempting to gain privileges. for the print system. If the hosts.equiv or hosts.lpd file is writable be gained. In addition, there is no reason for non-root users to be be gained. In addition, there is no reason for non-root users to be The hosts.equiv file defines the trusted hosts for the Berkeley 'R' for the print system. If the hosts.equiv or hosts.lpd file is writable The hosts.equiv file defines the trusted hosts for the Berkeley 'R'












by users other than root, then unauthorized privileges or access may by users other than root, then unauthorized privileges or access may by users other than root, then unauthorized privileges or access may for the print system. If the hosts.equiv or hosts.lpd file is writable commands (rsh, rlogin), while the hosts.lpd file defines trusted hosts commands (rsh, rlogin), while the hosts.lpd file defines trusted hosts commands (rsh, rlogin), while the hosts.lpd file defines trusted hosts The /etc/hosts.equiv and /etc/hosts.lpd files define trusted hosts. be gained. In addition, there is no reason for non-root users to be for the print system. If the hosts.equiv or hosts.lpd file is writable commands (rsh, rlogin), while the hosts.lpd file defines trusted hosts for the print system. If the hosts.equiv or hosts.lpd file is writable for the print system. If the hosts.equiv or hosts.lpd file is writable by users other than root, then unauthorized privileges or access may The hosts.equiv file defines the trusted hosts for the Berkeley 'R' be gained. In addition, there is no reason for non-root users to be able to read these files. Making them unreadable reduces the information commands (rsh, rlogin), while the hosts.lpd file defines trusted hosts commands (rsh, rlogin), while the hosts.lpd file defines trusted hosts by users other than root, then unauthorized privileges or access may for the print system. If the hosts.equiv or hosts.lpd file is writable by users other than root, then unauthorized privileges or access may The hosts.equiv file defines the trusted hosts for the Berkeley 'R' The hosts.equiv file defines the trusted hosts for the Berkeley 'R'











able to read these files. Making them unreadable reduces the information be gained. In addition, there is no reason for non-root users to be





by users other than root, then unauthorized privileges or access may






by users other than root, then unauthorized privileges or access may able to read these files. Making them unreadable reduces the information

Code [perm012w]

commands (rsh, rlogin), while the hosts.lpd file defines trusted hosts by users other than root, then unauthorized privileges or access may commands (rsh, rlogin), while the hosts.lpd file defines trusted hosts able to read these files. Making them unreadable reduces the information for the print system. If the hosts.equiv or hosts.lpd file is writable for the print system. If the hosts.equiv or hosts.lpd file is writable for the print system. If the hosts.equiv or hosts.lpd file is writable be gained. In addition, there is no reason for non-root users to be be gained. In addition, there is no reason for non-root users to be by users other than root, then unauthorized privileges or access may be gained. In addition, there is no reason for non-root users to be The hosts.equiv file defines the trusted hosts for the Berkeley 'R' for the print system. If the hosts.equiv or hosts.lpd file is writable by users other than root, then unauthorized privileges or access may by users other than root, then unauthorized privileges or access may be gained. In addition, there is no reason for non-root users to be by users other than root, then unauthorized privileges or access may able to read these files. Making them unreadable reduces the information commands (rsh, rlogin), while the hosts.lpd file defines trusted hosts available to an intruder attempting to gain privileges. for the print system. If the hosts.equiv or hosts.lpd file is writable for the print system. If the hosts.equiv or hosts.lpd file is writable

Code [perm012w]

by users other than root, then unauthorized privileges or access may commands (rsh, rlogin), while the hosts.lpd file defines trusted hosts be gained. In addition, there is no reason for non-root users to be be gained. In addition, there is no reason for non-root users to be commands (rsh, rlogin), while the hosts.lpd file defines trusted hosts

Code [perm012w]

able to read these files. Making them unreadable reduces the information be gained. In addition, there is no reason for non-root users to be available to an intruder attempting to gain privileges. be gained. In addition, there is no reason for non-root users to be available to an intruder attempting to gain privileges. for the print system. If the hosts.equiv or hosts.lpd file is writable available to an intruder attempting to gain privileges. for the print system. If the hosts.equiv or hosts.lpd file is writable The /etc/inetd.conf file defines the network daemons controlled by be gained. In addition, there is no reason for non-root users to be by users other than root, then unauthorized privileges or access may able to read these files. Making them unreadable reduces the information by users other than root, then unauthorized privileges or access may by users other than root, then unauthorized privileges or access may able to read these files. Making them unreadable reduces the information be gained. In addition, there is no reason for non-root users to be commands (rsh, rlogin), while the hosts.lpd file defines trusted hosts able to read these files. Making them unreadable reduces the information by users other than root, then unauthorized privileges or access may able to read these files. Making them unreadable reduces the information be gained. In addition, there is no reason for non-root users to be be gained. In addition, there is no reason for non-root users to be be gained. In addition, there is no reason for non-root users to be available to an intruder attempting to gain privileges.












by users other than root, then unauthorized privileges or access may The /etc/inetd.conf file defines the network daemons controlled by for the print system. If the hosts.equiv or hosts.lpd file is writable by users other than root, then unauthorized privileges or access may for the print system. If the hosts.equiv or hosts.lpd file is writable be gained. In addition, there is no reason for non-root users to be able to read these files. Making them unreadable reduces the information able to read these files. Making them unreadable reduces the information The /etc/inetd.conf file defines the network daemons controlled by for the print system. If the hosts.equiv or hosts.lpd file is writable able to read these files. Making them unreadable reduces the information







available to an intruder attempting to gain privileges.




able to read these files. Making them unreadable reduces the information











by users other than root, then unauthorized privileges or access may `inetd'. If this file is writable by non-root users, then unauthorized











available to an intruder attempting to gain privileges. able to read these files. Making them unreadable reduces the information available to an intruder attempting to gain privileges. able to read these files. Making them unreadable reduces the information by users other than root, then unauthorized privileges or access may be gained. In addition, there is no reason for non-root users to be be gained. In addition, there is no reason for non-root users to be for the print system. If the hosts.equiv or hosts.lpd file is writable be gained. In addition, there is no reason for non-root users to be available to an intruder attempting to gain privileges. be gained. In addition, there is no reason for non-root users to be available to an intruder attempting to gain privileges. able to read these files. Making them unreadable reduces the information

Code [perm012w]

able to read these files. Making them unreadable reduces the information able to read these files. Making them unreadable reduces the information












be gained. In addition, there is no reason for non-root users to be be gained. In addition, there is no reason for non-root users to be by users other than root, then unauthorized privileges or access may `inetd'. If this file is writable by non-root users, then unauthorized able to read these files. Making them unreadable reduces the information by users other than root, then unauthorized privileges or access may available to an intruder attempting to gain privileges. available to an intruder attempting to gain privileges. `inetd'. If this file is writable by non-root users, then unauthorized by users other than root, then unauthorized privileges or access may

Code [perm012w]

Code [perm012w]

available to an intruder attempting to gain privileges. available to an intruder attempting to gain privileges.












be gained. In addition, there is no reason for non-root users to be

Code [perm012w]












access can be obtained. In addition, it is not necessary that this file available to an intruder attempting to gain privileges.











available to an intruder attempting to gain privileges. able to read these files. Making them unreadable reduces the information able to read these files. Making them unreadable reduces the information by users other than root, then unauthorized privileges or access may able to read these files. Making them unreadable reduces the information be gained. In addition, there is no reason for non-root users to be











able to read these files. Making them unreadable reduces the information available to an intruder attempting to gain privileges.

Code [perm012w]












The /etc/inetd.conf file defines the network daemons controlled by available to an intruder attempting to gain privileges. available to an intruder attempting to gain privileges. access can be obtained. In addition, it is not necessary that this file able to read these files. Making them unreadable reduces the information be gained. In addition, there is no reason for non-root users to be available to an intruder attempting to gain privileges. able to read these files. Making them unreadable reduces the information be gained. In addition, there is no reason for non-root users to be be gained. In addition, there is no reason for non-root users to be access can be obtained. In addition, it is not necessary that this file

Code [perm012w]

The /etc/inetd.conf file defines the network daemons controlled by The /etc/inetd.conf file defines the network daemons controlled by













































able to read these files. Making them unreadable reduces the information

Code [perm012w]

Code [perm012w]

The /etc/inetd.conf file defines the network daemons controlled by

Code [perm012w]

available to an intruder attempting to gain privileges.








available to an intruder attempting to gain privileges.







available to an intruder attempting to gain privileges.







be gained. In addition, there is no reason for non-root users to be




able to read these files. Making them unreadable reduces the information



be readable by non-root users. Making the file unreadable reduces the





available to an intruder attempting to gain privileges.

Code [perm012w]

The /etc/inetd.conf file defines the network daemons controlled by `inetd'. If this file is writable by non-root users, then unauthorized












available to an intruder attempting to gain privileges.




able to read these files. Making them unreadable reduces the information


available to an intruder attempting to gain privileges.







be readable by non-root users. Making the file unreadable reduces the

able to read these files. Making them unreadable reduces the information

Code [perm012w]

be readable by non-root users. Making the file unreadable reduces the able to read these files. Making them unreadable reduces the information

Code [perm012w]

Code [perm012w]

The /etc/inetd.conf file defines the network daemons controlled by `inetd'. If this file is writable by non-root users, then unauthorized `inetd'. If this file is writable by non-root users, then unauthorized

Code [perm012w]

The /etc/inetd.conf file defines the network daemons controlled by The /etc/inetd.conf file defines the network daemons controlled by available to an intruder attempting to gain privileges. `inetd'. If this file is writable by non-root users, then unauthorized

Code [perm012w]

Code [perm012w]

Code [perm012w]


The /etc/inetd.conf file defines the network daemons controlled by




















able to read these files. Making them unreadable reduces the information

information available to an intruder attempting to gain privileges. The /etc/inetd.conf file defines the network daemons controlled by available to an intruder attempting to gain privileges.






`inetd'. If this file is writable by non-root users, then unauthorized





access can be obtained. In addition, it is not necessary that this file











Code [perm012w]

Code [perm012w]

















information available to an intruder attempting to gain privileges. available to an intruder attempting to gain privileges. information available to an intruder attempting to gain privileges. available to an intruder attempting to gain privileges. The /etc/inetd.conf file defines the network daemons controlled by

Code [perm012w]

available to an intruder attempting to gain privileges. The /etc/inetd.conf file defines the network daemons controlled by access can be obtained. In addition, it is not necessary that this file access can be obtained. In addition, it is not necessary that this file The /etc/inetd.conf file defines the network daemons controlled by `inetd'. If this file is writable by non-root users, then unauthorized `inetd'. If this file is writable by non-root users, then unauthorized `inetd'. If this file is writable by non-root users, then unauthorized The /etc/inetd.conf file defines the network daemons controlled by


access can be obtained. In addition, it is not necessary that this file










Code [perm012w]

Code [perm012w]

The /etc/inetd.conf file defines the network daemons controlled by The /etc/inetd.conf file defines the network daemons controlled by The /etc/inetd.conf file defines the network daemons controlled by `inetd'. If this file is writable by non-root users, then unauthorized

Code [perm012w]

`inetd'. If this file is writable by non-root users, then unauthorized












access can be obtained. In addition, it is not necessary that this file available to an intruder attempting to gain privileges.
be readable by non-root users. Making the file unreadable reduces the











Code [perm012w]

Code [perm012w]

The /etc/inetd.conf file defines the network daemons controlled by The /etc/inetd.conf file defines the network daemons controlled by












Code [perm012w]












`inetd'. If this file is writable by non-root users, then unauthorized






















The /etc/inetd.conf file defines the network daemons controlled by











be readable by non-root users. Making the file unreadable reduces the `inetd'. If this file is writable by non-root users, then unauthorized `inetd'. If this file is writable by non-root users, then unauthorized

Code [perm012w]

access can be obtained. In addition, it is not necessary that this file access can be obtained. In addition, it is not necessary that this file be readable by non-root users. Making the file unreadable reduces the access can be obtained. In addition, it is not necessary that this file be readable by non-root users. Making the file unreadable reduces the `inetd'. If this file is writable by non-root users, then unauthorized The /etc/inetd.conf file defines the network daemons controlled by The /etc/inetd.conf file defines the network daemons controlled by

Code [perm013f]

`inetd'. If this file is writable by non-root users, then unauthorized `inetd'. If this file is writable by non-root users, then unauthorized `inetd'. If this file is writable by non-root users, then unauthorized

Code [perm012w]

access can be obtained. In addition, it is not necessary that this file access can be obtained. In addition, it is not necessary that this file The /etc/inetd.conf file defines the network daemons controlled by be readable by non-root users. Making the file unreadable reduces the












Code [perm012w]

The /etc/inetd.conf file defines the network daemons controlled by

Code [perm013f]

information available to an intruder attempting to gain privileges. The /etc/inetd.conf file defines the network daemons controlled by `inetd'. If this file is writable by non-root users, then unauthorized `inetd'. If this file is writable by non-root users, then unauthorized The /etc/inetd.conf file defines the network daemons controlled by

Code [perm012w]

Code [perm013f]

access can be obtained. In addition, it is not necessary that this file

Code [perm012w]

`inetd'. If this file is writable by non-root users, then unauthorized access can be obtained. In addition, it is not necessary that this file access can be obtained. In addition, it is not necessary that this file be readable by non-root users. Making the file unreadable reduces the information available to an intruder attempting to gain privileges. The /etc/inetd.conf file defines the network daemons controlled by information available to an intruder attempting to gain privileges. be readable by non-root users. Making the file unreadable reduces the access can be obtained. In addition, it is not necessary that this file information available to an intruder attempting to gain privileges. `inetd'. If this file is writable by non-root users, then unauthorized be readable by non-root users. Making the file unreadable reduces the The /etc/netgroup file defines network groups which consist of machines `inetd'. If this file is writable by non-root users, then unauthorized access can be obtained. In addition, it is not necessary that this file access can be obtained. In addition, it is not necessary that this file

Code [perm012w]

access can be obtained. In addition, it is not necessary that this file `inetd'. If this file is writable by non-root users, then unauthorized be readable by non-root users. Making the file unreadable reduces the The /etc/inetd.conf file defines the network daemons controlled by be readable by non-root users. Making the file unreadable reduces the information available to an intruder attempting to gain privileges. The /etc/netgroup file defines network groups which consist of machines `inetd'. If this file is writable by non-root users, then unauthorized








`inetd'. If this file is writable by non-root users, then unauthorized


`inetd'. If this file is writable by non-root users, then unauthorized
access can be obtained. In addition, it is not necessary that this file

The /etc/inetd.conf file defines the network daemons controlled by

access can be obtained. In addition, it is not necessary that this file The /etc/inetd.conf file defines the network daemons controlled by The /etc/netgroup file defines network groups which consist of machines The /etc/inetd.conf file defines the network daemons controlled by be readable by non-root users. Making the file unreadable reduces the be readable by non-root users. Making the file unreadable reduces the access can be obtained. In addition, it is not necessary that this file information available to an intruder attempting to gain privileges. be readable by non-root users. Making the file unreadable reduces the `inetd'. If this file is writable by non-root users, then unauthorized


information available to an intruder attempting to gain privileges.










access can be obtained. In addition, it is not necessary that this file











be readable by non-root users. Making the file unreadable reduces the information available to an intruder attempting to gain privileges. and users. Allowing write access can allow unauthorized access or access can be obtained. In addition, it is not necessary that this file be readable by non-root users. Making the file unreadable reduces the be readable by non-root users. Making the file unreadable reduces the be readable by non-root users. Making the file unreadable reduces the access can be obtained. In addition, it is not necessary that this file The /etc/inetd.conf file defines the network daemons controlled by information available to an intruder attempting to gain privileges. `inetd'. If this file is writable by non-root users, then unauthorized and users. Allowing write access can allow unauthorized access or
information available to an intruder attempting to gain privileges.




Code [perm013f]


be readable by non-root users. Making the file unreadable reduces the `inetd'. If this file is writable by non-root users, then unauthorized access can be obtained. In addition, it is not necessary that this file access can be obtained. In addition, it is not necessary that this file `inetd'. If this file is writable by non-root users, then unauthorized access can be obtained. In addition, it is not necessary that this file be readable by non-root users. Making the file unreadable reduces the and users. Allowing write access can allow unauthorized access or information available to an intruder attempting to gain privileges. `inetd'. If this file is writable by non-root users, then unauthorized information available to an intruder attempting to gain privileges.

Code [perm013f]












Code [perm013f]

access can be obtained. In addition, it is not necessary that this file

Code [perm013f]

information available to an intruder attempting to gain privileges. be readable by non-root users. Making the file unreadable reduces the












be readable by non-root users. Making the file unreadable reduces the information available to an intruder attempting to gain privileges. privileges. be readable by non-root users. Making the file unreadable reduces the






information available to an intruder attempting to gain privileges.





information available to an intruder attempting to gain privileges. information available to an intruder attempting to gain privileges.











Code [perm013f]

privileges. `inetd'. If this file is writable by non-root users, then unauthorized be readable by non-root users. Making the file unreadable reduces the access can be obtained. In addition, it is not necessary that this file information available to an intruder attempting to gain privileges.


The /etc/netgroup file defines network groups which consist of machines










information available to an intruder attempting to gain privileges. be readable by non-root users. Making the file unreadable reduces the access can be obtained. In addition, it is not necessary that this file be readable by non-root users. Making the file unreadable reduces the be readable by non-root users. Making the file unreadable reduces the privileges. access can be obtained. In addition, it is not necessary that this file











access can be obtained. In addition, it is not necessary that this file

Code [perm013f]

The /etc/netgroup file defines network groups which consist of machines












The /etc/netgroup file defines network groups which consist of machines

Code [perm013f]












The /etc/netgroup file defines network groups which consist of machines information available to an intruder attempting to gain privileges. be readable by non-root users. Making the file unreadable reduces the

Code [perm013f]

information available to an intruder attempting to gain privileges.













Code [perm013f]


information available to an intruder attempting to gain privileges.




























The /etc/netgroup file defines network groups which consist of machines access can be obtained. In addition, it is not necessary that this file

Code [perm013f]

information available to an intruder attempting to gain privileges.












and users. Allowing write access can allow unauthorized access or
















information available to an intruder attempting to gain privileges. be readable by non-root users. Making the file unreadable reduces the information available to an intruder attempting to gain privileges.











Code [perm013f]

be readable by non-root users. Making the file unreadable reduces the information available to an intruder attempting to gain privileges. be readable by non-root users. Making the file unreadable reduces the

Code [perm013f]

be readable by non-root users. Making the file unreadable reduces the

Code [perm013f]

The /etc/netgroup file defines network groups which consist of machines The /etc/netgroup file defines network groups which consist of machines and users. Allowing write access can allow unauthorized access or and users. Allowing write access can allow unauthorized access or and users. Allowing write access can allow unauthorized access or

Code [perm014a]

information available to an intruder attempting to gain privileges.












The /etc/netgroup file defines network groups which consist of machines

Code [perm013f]

Code [perm013f]

Code [perm013f]

Code [perm013f]























The /etc/netgroup file defines network groups which consist of machines and users. Allowing write access can allow unauthorized access or

Code [perm014a]

be readable by non-root users. Making the file unreadable reduces the

Code [perm013f]

Code [perm013f]












The /etc/netgroup file defines network groups which consist of machines

Code [perm014a]

privileges.












information available to an intruder attempting to gain privileges.











information available to an intruder attempting to gain privileges.











The /etc/netgroup file defines network groups which consist of machines The /etc/netgroup file defines network groups which consist of machines information available to an intruder attempting to gain privileges. information available to an intruder attempting to gain privileges. The /etc/netgroup file defines network groups which consist of machines and users. Allowing write access can allow unauthorized access or and users. Allowing write access can allow unauthorized access or privileges.

Code [perm013f]

privileges.

Code [perm013f]

privileges. and users. Allowing write access can allow unauthorized access or If /etc/passwd is writable by non-root users, then new login id's












Code [perm013f]

The /etc/netgroup file defines network groups which consist of machines The /etc/netgroup file defines network groups which consist of machines The /etc/netgroup file defines network groups which consist of machines The /etc/netgroup file defines network groups which consist of machines If /etc/passwd is writable by non-root users, then new login id's and users. Allowing write access can allow unauthorized access or information available to an intruder attempting to gain privileges. privileges.

Code [perm013f]

The /etc/netgroup file defines network groups which consist of machines and users. Allowing write access can allow unauthorized access or The /etc/netgroup file defines network groups which consist of machines

Code [perm013f]












If /etc/passwd is writable by non-root users, then new login id's

Code [perm013f]

Code [perm013f]

















and users. Allowing write access can allow unauthorized access or











and users. Allowing write access can allow unauthorized access or privileges. and users. Allowing write access can allow unauthorized access or











privileges. The /etc/netgroup file defines network groups which consist of machines
















Code [perm013f]













privileges. The /etc/netgroup file defines network groups which consist of machines can be added to the system. Unauthorized access or privileges can and users. Allowing write access can allow unauthorized access or and users. Allowing write access can allow unauthorized access or and users. Allowing write access can allow unauthorized access or and users. Allowing write access can allow unauthorized access or privileges. The /etc/netgroup file defines network groups which consist of machines


can be added to the system. Unauthorized access or privileges can









Code [perm014a]


The /etc/netgroup file defines network groups which consist of machines and users. Allowing write access can allow unauthorized access or privileges. The /etc/netgroup file defines network groups which consist of machines and users. Allowing write access can allow unauthorized access or

Code [perm013f]

Code [perm013f]

can be added to the system. Unauthorized access or privileges can The /etc/netgroup file defines network groups which consist of machines privileges. The /etc/netgroup file defines network groups which consist of machines

Code [perm013f]

Code [perm013f]

privileges. privileges.












Code [perm014a]

Code [perm014a]

and users. Allowing write access can allow unauthorized access or

Code [perm014a]












The /etc/netgroup file defines network groups which consist of machines easily be obtained. If the file is world writable, this is a possible privileges. and users. Allowing write access can allow unauthorized access or











privileges. privileges.

Code [perm013f]


privileges.









and users. Allowing write access can allow unauthorized access or

Code [perm014a]

If /etc/passwd is writable by non-root users, then new login id's and users. Allowing write access can allow unauthorized access or privileges. privileges.









easily be obtained. If the file is world writable, this is a possible



and users. Allowing write access can allow unauthorized access or The /etc/netgroup file defines network groups which consist of machines and users. Allowing write access can allow unauthorized access or easily be obtained. If the file is world writable, this is a possible The /etc/netgroup file defines network groups which consist of machines The /etc/netgroup file defines network groups which consist of machines and users. Allowing write access can allow unauthorized access or






















The /etc/netgroup file defines network groups which consist of machines If /etc/passwd is writable by non-root users, then new login id's
If /etc/passwd is writable by non-root users, then new login id's











Code [perm014a]

Code [perm014a]

privileges. If /etc/passwd is writable by non-root users, then new login id's and users. Allowing write access can allow unauthorized access or indication that the system has been compromised. The system should privileges.

Code [perm014a]

























Code [perm014a]


The /etc/netgroup file defines network groups which consist of machines


privileges.









If /etc/passwd is writable by non-root users, then new login id's

Code [perm014a]

can be added to the system. Unauthorized access or privileges can privileges. indication that the system has been compromised. The system should















privileges.








and users. Allowing write access can allow unauthorized access or and users. Allowing write access can allow unauthorized access or privileges. indication that the system has been compromised. The system should

Code [perm014a]

privileges.

Code [perm014a]

Code [perm014a]

and users. Allowing write access can allow unauthorized access or If /etc/passwd is writable by non-root users, then new login id's If /etc/passwd is writable by non-root users, then new login id's can be added to the system. Unauthorized access or privileges can can be added to the system. Unauthorized access or privileges can and users. Allowing write access can allow unauthorized access or

Code [perm014a]

Code [perm014a]

Code [perm014a]








If /etc/passwd is writable by non-root users, then new login id's


privileges.






Code [perm014a]

can be added to the system. Unauthorized access or privileges can


If /etc/passwd is writable by non-root users, then new login id's be checked for other signs of intrusion.






and users. Allowing write access can allow unauthorized access or





can be added to the system. Unauthorized access or privileges can

Code [perm014a]

Code [perm014a]

be checked for other signs of intrusion. easily be obtained. If the file is world writable, this is a possible If /etc/passwd is writable by non-root users, then new login id's













privileges. privileges.









be checked for other signs of intrusion.













If /etc/passwd is writable by non-root users, then new login id's If /etc/passwd is writable by non-root users, then new login id's If /etc/passwd is writable by non-root users, then new login id's privileges. easily be obtained. If the file is world writable, this is a possible can be added to the system. Unauthorized access or privileges can can be added to the system. Unauthorized access or privileges can

Code [perm014a]

privileges. easily be obtained. If the file is world writable, this is a possible

Code [perm014a]

If /etc/passwd is writable by non-root users, then new login id's can be added to the system. Unauthorized access or privileges can If /etc/passwd is writable by non-root users, then new login id's easily be obtained. If the file is world writable, this is a possible








If /etc/passwd is writable by non-root users, then new login id's




Code [perm014a]

If /etc/passwd is writable by non-root users, then new login id's can be added to the system. Unauthorized access or privileges can easily be obtained. If the file is world writable, this is a possible












privileges. If /etc/passwd is writable by non-root users, then new login id's can be added to the system. Unauthorized access or privileges can

Code [perm014a]












indication that the system has been compromised. The system should If /etc/passwd is writable by non-root users, then new login id's

Code [perm014a]

Code [perm014a]

Code [perm014a]


can be added to the system. Unauthorized access or privileges can























can be added to the system. Unauthorized access or privileges can










If /etc/passwd is writable by non-root users, then new login id's

can be added to the system. Unauthorized access or privileges can easily be obtained. If the file is world writable, this is a possible easily be obtained. If the file is world writable, this is a possible indication that the system has been compromised. The system should











Code [perm014a]

If /etc/passwd is writable by non-root users, then new login id's can be added to the system. Unauthorized access or privileges can easily be obtained. If the file is world writable, this is a possible indication that the system has been compromised. The system should can be added to the system. Unauthorized access or privileges can

Code [perm015f]

can be added to the system. Unauthorized access or privileges can If /etc/passwd is writable by non-root users, then new login id's indication that the system has been compromised. The system should can be added to the system. Unauthorized access or privileges can easily be obtained. If the file is world writable, this is a possible indication that the system has been compromised. The system should












Code [perm015f]

can be added to the system. Unauthorized access or privileges can easily be obtained. If the file is world writable, this is a possible be checked for other signs of intrusion. If /etc/passwd is writable by non-root users, then new login id's can be added to the system. Unauthorized access or privileges can If /etc/passwd is writable by non-root users, then new login id's If /etc/passwd is writable by non-root users, then new login id's

Code [perm014a]

Code [perm014a]

Code [perm015f]

If /etc/passwd is writable by non-root users, then new login id's easily be obtained. If the file is world writable, this is a possible

Code [perm014a]

Code [perm014a]

indication that the system has been compromised. The system should easily be obtained. If the file is world writable, this is a possible easily be obtained. If the file is world writable, this is a possible be checked for other signs of intrusion. If /etc/passwd is writable by non-root users, then new login id's indication that the system has been compromised. The system should easily be obtained. If the file is world writable, this is a possible can be added to the system. Unauthorized access or privileges can The 'rc.*' scripts are executed during system startup. If they are be checked for other signs of intrusion. easily be obtained. If the file is world writable, this is a possible indication that the system has been compromised. The system should can be added to the system. Unauthorized access or privileges can easily be obtained. If the file is world writable, this is a possible

Code [perm014a]

be checked for other signs of intrusion. can be added to the system. Unauthorized access or privileges can indication that the system has been compromised. The system should be checked for other signs of intrusion. easily be obtained. If the file is world writable, this is a possible The 'rc.*' scripts are executed during system startup. If they are easily be obtained. If the file is world writable, this is a possible












easily be obtained. If the file is world writable, this is a possible can be added to the system. Unauthorized access or privileges can can be added to the system. Unauthorized access or privileges can indication that the system has been compromised. The system should If /etc/passwd is writable by non-root users, then new login id's can be added to the system. Unauthorized access or privileges can If /etc/passwd is writable by non-root users, then new login id's can be added to the system. Unauthorized access or privileges can The 'rc.*' scripts are executed during system startup. If they are indication that the system has been compromised. The system should If /etc/passwd is writable by non-root users, then new login id's If /etc/passwd is writable by non-root users, then new login id's be checked for other signs of intrusion.










be checked for other signs of intrusion.

indication that the system has been compromised. The system should indication that the system has been compromised. The system should can be added to the system. Unauthorized access or privileges can











writable by non-root users, then unauthorized access or privileges can easily be obtained. If the file is world writable, this is a possible indication that the system has been compromised. The system should be checked for other signs of intrusion. indication that the system has been compromised. The system should be checked for other signs of intrusion. easily be obtained. If the file is world writable, this is a possible indication that the system has been compromised. The system should If /etc/passwd is writable by non-root users, then new login id's writable by non-root users, then unauthorized access or privileges can

Code [perm015f]













indication that the system has been compromised. The system should easily be obtained. If the file is world writable, this is a possible indication that the system has been compromised. The system should indication that the system has been compromised. The system should easily be obtained. If the file is world writable, this is a possible be checked for other signs of intrusion. easily be obtained. If the file is world writable, this is a possible can be added to the system. Unauthorized access or privileges can easily be obtained. If the file is world writable, this is a possible easily be obtained. If the file is world writable, this is a possible writable by non-root users, then unauthorized access or privileges can can be added to the system. Unauthorized access or privileges can be checked for other signs of intrusion.

Code [perm015f]

can be added to the system. Unauthorized access or privileges can












can be added to the system. Unauthorized access or privileges can











Code [perm015f]

be checked for other signs of intrusion. be checked for other signs of intrusion. easily be obtained. If the file is world writable, this is a possible be checked for other signs of intrusion. be obtained. In addition, there is no need for these files to be world indication that the system has been compromised. The system should be checked for other signs of intrusion.










be checked for other signs of intrusion.


Code [perm015f]

indication that the system has been compromised. The system should


Code [perm015f]


can be added to the system. Unauthorized access or privileges can The 'rc.*' scripts are executed during system startup. If they are be checked for other signs of intrusion. be obtained. In addition, there is no need for these files to be world indication that the system has been compromised. The system should be checked for other signs of intrusion. be checked for other signs of intrusion. indication that the system has been compromised. The system should indication that the system has been compromised. The system should indication that the system has been compromised. The system should be obtained. In addition, there is no need for these files to be world










easily be obtained. If the file is world writable, this is a possible


Code [perm015f]

indication that the system has been compromised. The system should easily be obtained. If the file is world writable, this is a possible

Code [perm015f]

easily be obtained. If the file is world writable, this is a possible The 'rc.*' scripts are executed during system startup. If they are easily be obtained. If the file is world writable, this is a possible The 'rc.*' scripts are executed during system startup. If they are


















Code [perm015f]








indication that the system has been compromised. The system should




be checked for other signs of intrusion.











Code [perm015f]

The 'rc.*' scripts are executed during system startup. If they are readable. Making them unreadable reduces the information available to be checked for other signs of intrusion. easily be obtained. If the file is world writable, this is a possible












The 'rc.*' scripts are executed during system startup. If they are











writable by non-root users, then unauthorized access or privileges can











readable. Making them unreadable reduces the information available to











be checked for other signs of intrusion. be checked for other signs of intrusion. be checked for other signs of intrusion.

Code [perm015f]

Code [perm015f]

be checked for other signs of intrusion. readable. Making them unreadable reduces the information available to be checked for other signs of intrusion. indication that the system has been compromised. The system should The 'rc.*' scripts are executed during system startup. If they are indication that the system has been compromised. The system should indication that the system has been compromised. The system should

Code [perm015f]

Code [perm015f]

The 'rc.*' scripts are executed during system startup. If they are indication that the system has been compromised. The system should writable by non-root users, then unauthorized access or privileges can

Code [perm015f]

writable by non-root users, then unauthorized access or privileges can be checked for other signs of intrusion.






The 'rc.*' scripts are executed during system startup. If they are






Code [perm015f]












an intruder attempting to gain privileges.

Code [perm015f]

writable by non-root users, then unauthorized access or privileges can

Code [perm015f]

The 'rc.*' scripts are executed during system startup. If they are

Code [perm015f]

indication that the system has been compromised. The system should

Code [perm015f]

an intruder attempting to gain privileges. writable by non-root users, then unauthorized access or privileges can be obtained. In addition, there is no need for these files to be world























an intruder attempting to gain privileges.











The 'rc.*' scripts are executed during system startup. If they are
The 'rc.*' scripts are executed during system startup. If they are






















be checked for other signs of intrusion. be checked for other signs of intrusion. writable by non-root users, then unauthorized access or privileges can The 'rc.*' scripts are executed during system startup. If they are be checked for other signs of intrusion. The 'rc.*' scripts are executed during system startup. If they are be checked for other signs of intrusion.

Code [perm015f]

The 'rc.*' scripts are executed during system startup. If they are writable by non-root users, then unauthorized access or privileges can












be obtained. In addition, there is no need for these files to be world writable by non-root users, then unauthorized access or privileges can be obtained. In addition, there is no need for these files to be world

Code [perm015f]












writable by non-root users, then unauthorized access or privileges can The 'rc.*' scripts are executed during system startup. If they are The 'rc.*' scripts are executed during system startup. If they are The 'rc.*' scripts are executed during system startup. If they are be obtained. In addition, there is no need for these files to be world The 'rc.*' scripts are executed during system startup. If they are

Code [perm015f]

Code [perm015f]

The 'rc.*' scripts are executed during system startup. If they are












be checked for other signs of intrusion. readable. Making them unreadable reduces the information available to

Code [perm015f]

Code [perm015f]

be obtained. In addition, there is no need for these files to be world






writable by non-root users, then unauthorized access or privileges can






Code [perm015f]

writable by non-root users, then unauthorized access or privileges can

writable by non-root users, then unauthorized access or privileges can











Code [perm015f]

















be obtained. In addition, there is no need for these files to be world






writable by non-root users, then unauthorized access or privileges can











Code [perm016w]

The 'rc.*' scripts are executed during system startup. If they are writable by non-root users, then unauthorized access or privileges can be obtained. In addition, there is no need for these files to be world readable. Making them unreadable reduces the information available to be obtained. In addition, there is no need for these files to be world readable. Making them unreadable reduces the information available to The 'rc.*' scripts are executed during system startup. If they are be obtained. In addition, there is no need for these files to be world writable by non-root users, then unauthorized access or privileges can writable by non-root users, then unauthorized access or privileges can writable by non-root users, then unauthorized access or privileges can

Code [perm016w]

readable. Making them unreadable reduces the information available to writable by non-root users, then unauthorized access or privileges can The 'rc.*' scripts are executed during system startup. If they are writable by non-root users, then unauthorized access or privileges can an intruder attempting to gain privileges.



readable. Making them unreadable reduces the information available to






The 'rc.*' scripts are executed during system startup. If they are



Code [perm016w]

The 'rc.*' scripts are executed during system startup. If they are The 'rc.*' scripts are executed during system startup. If they are be obtained. In addition, there is no need for these files to be world

Code [perm015f]

The 'rc.*' scripts are executed during system startup. If they are be obtained. In addition, there is no need for these files to be world

Code [perm015f]

Code [perm015f]

be obtained. In addition, there is no need for these files to be world

Code [perm015f]

The 'rc.*' scripts are executed during system startup. If they are an intruder attempting to gain privileges. be obtained. In addition, there is no need for these files to be world readable. Making them unreadable reduces the information available to be obtained. In addition, there is no need for these files to be world writable by non-root users, then unauthorized access or privileges can The /etc/resolv.conf file is used to designate where Domain Name readable. Making them unreadable reduces the information available to an intruder attempting to gain privileges. readable. Making them unreadable reduces the information available to writable by non-root users, then unauthorized access or privileges can be obtained. In addition, there is no need for these files to be world an intruder attempting to gain privileges. be obtained. In addition, there is no need for these files to be world The /etc/resolv.conf file is used to designate where Domain Name

Code [perm015f]

be obtained. In addition, there is no need for these files to be world readable. Making them unreadable reduces the information available to writable by non-root users, then unauthorized access or privileges can be obtained. In addition, there is no need for these files to be world be obtained. In addition, there is no need for these files to be world writable by non-root users, then unauthorized access or privileges can an intruder attempting to gain privileges.


writable by non-root users, then unauthorized access or privileges can







The /etc/resolv.conf file is used to designate where Domain Name



writable by non-root users, then unauthorized access or privileges can readable. Making them unreadable reduces the information available to readable. Making them unreadable reduces the information available to The 'rc.*' scripts are executed during system startup. If they are writable by non-root users, then unauthorized access or privileges can readable. Making them unreadable reduces the information available to The 'rc.*' scripts are executed during system startup. If they are The 'rc.*' scripts are executed during system startup. If they are The 'rc.*' scripts are executed during system startup. If they are writable by non-root users, then unauthorized access or privileges can readable. Making them unreadable reduces the information available to an intruder attempting to gain privileges. readable. Making them unreadable reduces the information available to be obtained. In addition, there is no need for these files to be world











an intruder attempting to gain privileges. Service is to be obtained. If this file is writable by non-root an intruder attempting to gain privileges.











be obtained. In addition, there is no need for these files to be world





readable. Making them unreadable reduces the information available to
readable. Making them unreadable reduces the information available to






The 'rc.*' scripts are executed during system startup. If they are readable. Making them unreadable reduces the information available to readable. Making them unreadable reduces the information available to Service is to be obtained. If this file is writable by non-root an intruder attempting to gain privileges. be obtained. In addition, there is no need for these files to be world

Code [perm016w]

readable. Making them unreadable reduces the information available to be obtained. In addition, there is no need for these files to be world












be obtained. In addition, there is no need for these files to be world Service is to be obtained. If this file is writable by non-root be obtained. In addition, there is no need for these files to be world an intruder attempting to gain privileges. an intruder attempting to gain privileges. be obtained. In addition, there is no need for these files to be world writable by non-root users, then unauthorized access or privileges can an intruder attempting to gain privileges. writable by non-root users, then unauthorized access or privileges can writable by non-root users, then unauthorized access or privileges can be obtained. In addition, there is no need for these files to be world writable by non-root users, then unauthorized access or privileges can an intruder attempting to gain privileges.

Code [perm016w]

Code [perm016w]







users, then unauthorized access or privileges may be obtained.


readable. Making them unreadable reduces the information available to



an intruder attempting to gain privileges.











readable. Making them unreadable reduces the information available to











Code [perm016w]

writable by non-root users, then unauthorized access or privileges can an intruder attempting to gain privileges. an intruder attempting to gain privileges. an intruder attempting to gain privileges.

Code [perm016w]

readable. Making them unreadable reduces the information available to






an intruder attempting to gain privileges.






The /etc/resolv.conf file is used to designate where Domain Name readable. Making them unreadable reduces the information available to users, then unauthorized access or privileges may be obtained. an intruder attempting to gain privileges. readable. Making them unreadable reduces the information available to readable. Making them unreadable reduces the information available to users, then unauthorized access or privileges may be obtained.











readable. Making them unreadable reduces the information available to be obtained. In addition, there is no need for these files to be world











be obtained. In addition, there is no need for these files to be world be obtained. In addition, there is no need for these files to be world










be obtained. In addition, there is no need for these files to be world

The /etc/resolv.conf file is used to designate where Domain Name readable. Making them unreadable reduces the information available to

Code [perm016w]



Code [perm016w]


The /etc/resolv.conf file is used to designate where Domain Name

Code [perm016w]

an intruder attempting to gain privileges. This file does need to be world readable however. an intruder attempting to gain privileges.












be obtained. In addition, there is no need for these files to be world The /etc/resolv.conf file is used to designate where Domain Name






















Code [perm016w]

an intruder attempting to gain privileges.





This file does need to be world readable however.


















The /etc/resolv.conf file is used to designate where Domain Name an intruder attempting to gain privileges. Service is to be obtained. If this file is writable by non-root an intruder attempting to gain privileges. an intruder attempting to gain privileges.

Code [perm016w]

This file does need to be world readable however.












Code [perm016w]

an intruder attempting to gain privileges.

Code [perm016w]

readable. Making them unreadable reduces the information available to readable. Making them unreadable reduces the information available to

Code [perm016w]

readable. Making them unreadable reduces the information available to Service is to be obtained. If this file is writable by non-root The /etc/resolv.conf file is used to designate where Domain Name readable. Making them unreadable reduces the information available to an intruder attempting to gain privileges.

Code [perm016w]

Service is to be obtained. If this file is writable by non-root


The /etc/resolv.conf file is used to designate where Domain Name



The /etc/resolv.conf file is used to designate where Domain Name


















Code [perm016w]



Service is to be obtained. If this file is writable by non-root









Code [perm016w]

Code [perm016w]

readable. Making them unreadable reduces the information available to The /etc/resolv.conf file is used to designate where Domain Name

Code [perm016w]













































Service is to be obtained. If this file is writable by non-root





Code [perm016w]


users, then unauthorized access or privileges may be obtained.











The /etc/resolv.conf file is used to designate where Domain Name The /etc/resolv.conf file is used to designate where Domain Name



The /etc/resolv.conf file is used to designate where Domain Name








an intruder attempting to gain privileges. an intruder attempting to gain privileges. The /etc/resolv.conf file is used to designate where Domain Name an intruder attempting to gain privileges. users, then unauthorized access or privileges may be obtained. an intruder attempting to gain privileges.

Code [perm016w]

Code [perm016w]

Code [perm017w]












The /etc/resolv.conf file is used to designate where Domain Name Service is to be obtained. If this file is writable by non-root Service is to be obtained. If this file is writable by non-root The /etc/resolv.conf file is used to designate where Domain Name Service is to be obtained. If this file is writable by non-root users, then unauthorized access or privileges may be obtained. an intruder attempting to gain privileges. users, then unauthorized access or privileges may be obtained. The /etc/resolv.conf file is used to designate where Domain Name

Code [perm017w]

The /etc/resolv.conf file is used to designate where Domain Name

Code [perm016w]

Code [perm016w]

Service is to be obtained. If this file is writable by non-root

Code [perm016w]

The /etc/resolv.conf file is used to designate where Domain Name

Code [perm016w]

The /etc/resolv.conf file is used to designate where Domain Name users, then unauthorized access or privileges may be obtained.

Code [perm017w]

This file does need to be world readable however.

Code [perm016w]

Service is to be obtained. If this file is writable by non-root Service is to be obtained. If this file is writable by non-root Service is to be obtained. If this file is writable by non-root Service is to be obtained. If this file is writable by non-root




































Code [perm016w]

This file does need to be world readable however. The /etc/resolv.conf file is used to designate where Domain Name The /etc/resolv.conf file is used to designate where Domain Name The /etc/utmp file should not be writable by non-root users. This Service is to be obtained. If this file is writable by non-root users, then unauthorized access or privileges may be obtained. users, then unauthorized access or privileges may be obtained. Service is to be obtained. If this file is writable by non-root users, then unauthorized access or privileges may be obtained. This file does need to be world readable however.










Service is to be obtained. If this file is writable by non-root


This file does need to be world readable however. The /etc/resolv.conf file is used to designate where Domain Name The /etc/utmp file should not be writable by non-root users. This Service is to be obtained. If this file is writable by non-root Service is to be obtained. If this file is writable by non-root users, then unauthorized access or privileges may be obtained. The /etc/resolv.conf file is used to designate where Domain Name The /etc/resolv.conf file is used to designate where Domain Name The /etc/utmp file should not be writable by non-root users. This Service is to be obtained. If this file is writable by non-root This file does need to be world readable however.
The /etc/resolv.conf file is used to designate where Domain Name











The /etc/resolv.conf file is used to designate where Domain Name users, then unauthorized access or privileges may be obtained. users, then unauthorized access or privileges may be obtained. users, then unauthorized access or privileges may be obtained.

Code [perm016w]

Code [perm016w]

Code [perm016w]

users, then unauthorized access or privileges may be obtained.

Code [perm016w]












The /etc/resolv.conf file is used to designate where Domain Name Service is to be obtained. If this file is writable by non-root Service is to be obtained. If this file is writable by non-root is a security vulnerability. Unfortunately, on SunOS 4 systems, the users, then unauthorized access or privileges may be obtained.

Code [perm016w]

This file does need to be world readable however. This file does need to be world readable however. users, then unauthorized access or privileges may be obtained. This file does need to be world readable however.





















Service is to be obtained. If this file is writable by non-root


is a security vulnerability. Unfortunately, on SunOS 4 systems, the users, then unauthorized access or privileges may be obtained. users, then unauthorized access or privileges may be obtained. users, then unauthorized access or privileges may be obtained. This file does need to be world readable however. Service is to be obtained. If this file is writable by non-root

Code [perm017w]

Service is to be obtained. If this file is writable by non-root is a security vulnerability. Unfortunately, on SunOS 4 systems, the users, then unauthorized access or privileges may be obtained. Service is to be obtained. If this file is writable by non-root












Service is to be obtained. If this file is writable by non-root This file does need to be world readable however. This file does need to be world readable however. The /etc/resolv.conf file is used to designate where Domain Name This file does need to be world readable however. This file does need to be world readable however. The /etc/resolv.conf file is used to designate where Domain Name The /etc/resolv.conf file is used to designate where Domain Name The /etc/resolv.conf file is used to designate where Domain Name

Code [perm017w]

Service is to be obtained. If this file is writable by non-root users, then unauthorized access or privileges may be obtained. SunView and OpenWindows 'cmdtool' and 'shelltool' programs do not users, then unauthorized access or privileges may be obtained.







This file does need to be world readable however.





Code [perm017w]

Code [perm017w]

The /etc/resolv.conf file is used to designate where Domain Name This file does need to be world readable however.























SunView and OpenWindows 'cmdtool' and 'shelltool' programs do not This file does need to be world readable however. users, then unauthorized access or privileges may be obtained. This file does need to be world readable however.











The /etc/utmp file should not be writable by non-root users. This This file does need to be world readable however. users, then unauthorized access or privileges may be obtained.

Code [perm017w]

This file does need to be world readable however. users, then unauthorized access or privileges may be obtained. SunView and OpenWindows 'cmdtool' and 'shelltool' programs do not users, then unauthorized access or privileges may be obtained. users, then unauthorized access or privileges may be obtained.

Service is to be obtained. If this file is writable by non-root

































Service is to be obtained. If this file is writable by non-root Service is to be obtained. If this file is writable by non-root











The /etc/utmp file should not be writable by non-root users. This users, then unauthorized access or privileges may be obtained. Service is to be obtained. If this file is writable by non-root

Code [perm017w]

Code [perm017w]

This file does need to be world readable however. This file does need to be world readable however. The /etc/utmp file should not be writable by non-root users. This function correctly if it is not. If you are not using these tools, The /etc/utmp file should not be writable by non-root users. This














Service is to be obtained. If this file is writable by non-root

Code [perm017w]

Code [perm017w]

function correctly if it is not. If you are not using these tools, This file does need to be world readable however. is a security vulnerability. Unfortunately, on SunOS 4 systems, the This file does need to be world readable however.















The /etc/utmp file should not be writable by non-root users. This

This file does need to be world readable however.










function correctly if it is not. If you are not using these tools,











This file does need to be world readable however.

Code [perm017w]

This file does need to be world readable however.

Code [perm017w]

Code [perm017w]

users, then unauthorized access or privileges may be obtained.

Code [perm017w]

users, then unauthorized access or privileges may be obtained. users, then unauthorized access or privileges may be obtained. is a security vulnerability. Unfortunately, on SunOS 4 systems, the This file does need to be world readable however. The /etc/utmp file should not be writable by non-root users. This

Code [perm017w]

The /etc/utmp file should not be writable by non-root users. This users, then unauthorized access or privileges may be obtained.












is a security vulnerability. Unfortunately, on SunOS 4 systems, the

users, then unauthorized access or privileges may be obtained. is a security vulnerability. Unfortunately, on SunOS 4 systems, the

Code [perm017w]

then you should set the permissions to 644. The /etc/utmp file should not be writable by non-root users. This The /etc/utmp file should not be writable by non-root users. This

Code [perm017w]






Code [perm017w]

Code [perm017w]













SunView and OpenWindows 'cmdtool' and 'shelltool' programs do not

Code [perm017w]

is a security vulnerability. Unfortunately, on SunOS 4 systems, the then you should set the permissions to 644. then you should set the permissions to 644. The /etc/utmp file should not be writable by non-root users. This












This file does need to be world readable however.

The /etc/utmp file should not be writable by non-root users. This
















The /etc/utmp file should not be writable by non-root users. This The /etc/utmp file should not be writable by non-root users. This This file does need to be world readable however. This file does need to be world readable however.











SunView and OpenWindows 'cmdtool' and 'shelltool' programs do not

Code [perm017w]

The /etc/utmp file should not be writable by non-root users. This is a security vulnerability. Unfortunately, on SunOS 4 systems, the

Code [perm017w]

This file does need to be world readable however. is a security vulnerability. Unfortunately, on SunOS 4 systems, the This file does need to be world readable however.

Code [perm017w]












The /etc/utmp file should not be writable by non-root users. This SunView and OpenWindows 'cmdtool' and 'shelltool' programs do not SunView and OpenWindows 'cmdtool' and 'shelltool' programs do not The /etc/utmp file should not be writable by non-root users. This is a security vulnerability. Unfortunately, on SunOS 4 systems, the is a security vulnerability. Unfortunately, on SunOS 4 systems, the

Code [perm017w]

The /etc/utmp file should not be writable by non-root users. This The /etc/utmp file should not be writable by non-root users. This The /etc/utmp file should not be writable by non-root users. This












function correctly if it is not. If you are not using these tools,







Code [perm017w]


SunView and OpenWindows 'cmdtool' and 'shelltool' programs do not is a security vulnerability. Unfortunately, on SunOS 4 systems, the

Code [perm017w]










Code [perm017w]


is a security vulnerability. Unfortunately, on SunOS 4 systems, the is a security vulnerability. Unfortunately, on SunOS 4 systems, the

Code [perm017w]

is a security vulnerability. Unfortunately, on SunOS 4 systems, the















The /etc/utmp file should not be writable by non-root users. This

Code [perm018a]

function correctly if it is not. If you are not using these tools, is a security vulnerability. Unfortunately, on SunOS 4 systems, the SunView and OpenWindows 'cmdtool' and 'shelltool' programs do not
















SunView and OpenWindows 'cmdtool' and 'shelltool' programs do not







SunView and OpenWindows 'cmdtool' and 'shelltool' programs do not function correctly if it is not. If you are not using these tools, is a security vulnerability. Unfortunately, on SunOS 4 systems, the The /etc/utmp file should not be writable by non-root users. This The /etc/utmp file should not be writable by non-root users. This function correctly if it is not. If you are not using these tools, is a security vulnerability. Unfortunately, on SunOS 4 systems, the SunView and OpenWindows 'cmdtool' and 'shelltool' programs do not is a security vulnerability. Unfortunately, on SunOS 4 systems, the The /etc/utmp file should not be writable by non-root users. This

Code [perm018a]

is a security vulnerability. Unfortunately, on SunOS 4 systems, the

Code [perm018a]

is a security vulnerability. Unfortunately, on SunOS 4 systems, the

Code [perm017w]

The /etc/utmp file should not be writable by non-root users. This then you should set the permissions to 644. function correctly if it is not. If you are not using these tools, SunView and OpenWindows 'cmdtool' and 'shelltool' programs do not The /etc/utmp file should not be writable by non-root users. This

Code [perm017w]

The /etc/utmp file should not be writable by non-root users. This

Code [perm017w]

The /etc/utmp file should not be writable by non-root users. This SunView and OpenWindows 'cmdtool' and 'shelltool' programs do not SunView and OpenWindows 'cmdtool' and 'shelltool' programs do not SunView and OpenWindows 'cmdtool' and 'shelltool' programs do not is a security vulnerability. Unfortunately, on SunOS 4 systems, the The root directory should be protected from changes by non-root users.

Code [perm017w]

SunView and OpenWindows 'cmdtool' and 'shelltool' programs do not then you should set the permissions to 644.

Code [perm017w]

function correctly if it is not. If you are not using these tools, function correctly if it is not. If you are not using these tools, function correctly if it is not. If you are not using these tools, SunView and OpenWindows 'cmdtool' and 'shelltool' programs do not function correctly if it is not. If you are not using these tools, then you should set the permissions to 644. SunView and OpenWindows 'cmdtool' and 'shelltool' programs do not is a security vulnerability. Unfortunately, on SunOS 4 systems, the then you should set the permissions to 644. SunView and OpenWindows 'cmdtool' and 'shelltool' programs do not is a security vulnerability. Unfortunately, on SunOS 4 systems, the is a security vulnerability. Unfortunately, on SunOS 4 systems, the The root directory should be protected from changes by non-root users. The root directory should be protected from changes by non-root users. SunView and OpenWindows 'cmdtool' and 'shelltool' programs do not is a security vulnerability. Unfortunately, on SunOS 4 systems, the The /etc/utmp file should not be writable by non-root users. This SunView and OpenWindows 'cmdtool' and 'shelltool' programs do not



then you should set the permissions to 644.









is a security vulnerability. Unfortunately, on SunOS 4 systems, the function correctly if it is not. If you are not using these tools, is a security vulnerability. Unfortunately, on SunOS 4 systems, the The /etc/utmp file should not be writable by non-root users. This function correctly if it is not. If you are not using these tools, The /etc/utmp file should not be writable by non-root users. This function correctly if it is not. If you are not using these tools, is a security vulnerability. Unfortunately, on SunOS 4 systems, the function correctly if it is not. If you are not using these tools, If the directory is writable by non-root users, unauthorized access The /etc/utmp file should not be writable by non-root users. This then you should set the permissions to 644.











function correctly if it is not. If you are not using these tools, The /etc/utmp file should not be writable by non-root users. This SunView and OpenWindows 'cmdtool' and 'shelltool' programs do not then you should set the permissions to 644. then you should set the permissions to 644. function correctly if it is not. If you are not using these tools, SunView and OpenWindows 'cmdtool' and 'shelltool' programs do not function correctly if it is not. If you are not using these tools,


then you should set the permissions to 644.



















SunView and OpenWindows 'cmdtool' and 'shelltool' programs do not function correctly if it is not. If you are not using these tools, SunView and OpenWindows 'cmdtool' and 'shelltool' programs do not If the directory is writable by non-root users, unauthorized access

Code [perm018a]

SunView and OpenWindows 'cmdtool' and 'shelltool' programs do not is a security vulnerability. Unfortunately, on SunOS 4 systems, the function correctly if it is not. If you are not using these tools, function correctly if it is not. If you are not using these tools,





If the directory is writable by non-root users, unauthorized access







then you should set the permissions to 644. then you should set the permissions to 644. SunView and OpenWindows 'cmdtool' and 'shelltool' programs do not then you should set the permissions to 644. then you should set the permissions to 644. is a security vulnerability. Unfortunately, on SunOS 4 systems, the SunView and OpenWindows 'cmdtool' and 'shelltool' programs do not SunView and OpenWindows 'cmdtool' and 'shelltool' programs do not is a security vulnerability. Unfortunately, on SunOS 4 systems, the or privileges can be obtained.


Code [perm018a]

is a security vulnerability. Unfortunately, on SunOS 4 systems, the


then you should set the permissions to 644. is a security vulnerability. Unfortunately, on SunOS 4 systems, the

Code [perm018a]

function correctly if it is not. If you are not using these tools,

Code [perm018a]



function correctly if it is not. If you are not using these tools,










then you should set the permissions to 644. then you should set the permissions to 644.











function correctly if it is not. If you are not using these tools, then you should set the permissions to 644. function correctly if it is not. If you are not using these tools, or privileges can be obtained.

Code [perm018a]

SunView and OpenWindows 'cmdtool' and 'shelltool' programs do not function correctly if it is not. If you are not using these tools, The root directory should be protected from changes by non-root users. then you should set the permissions to 644. then you should set the permissions to 644. or privileges can be obtained.












function correctly if it is not. If you are not using these tools,



















SunView and OpenWindows 'cmdtool' and 'shelltool' programs do not

function correctly if it is not. If you are not using these tools, function correctly if it is not. If you are not using these tools, SunView and OpenWindows 'cmdtool' and 'shelltool' programs do not











Code [perm018a]












SunView and OpenWindows 'cmdtool' and 'shelltool' programs do not







The root directory should be protected from changes by non-root users.




SunView and OpenWindows 'cmdtool' and 'shelltool' programs do not

Code [perm018a]

Code [perm018a]

The root directory should be protected from changes by non-root users. The root directory should be protected from changes by non-root users.

Code [perm018a]

then you should set the permissions to 644. then you should set the permissions to 644.























then you should set the permissions to 644. then you should set the permissions to 644.











If the directory is writable by non-root users, unauthorized access

Code [perm018a]

function correctly if it is not. If you are not using these tools, The root directory should be protected from changes by non-root users.












then you should set the permissions to 644.

































then you should set the permissions to 644.

Code [perm018a]

Code [perm018a]

then you should set the permissions to 644. then you should set the permissions to 644. function correctly if it is not. If you are not using these tools,

Code [perm019a]

Code [perm018a]

The root directory should be protected from changes by non-root users. function correctly if it is not. If you are not using these tools,

Code [perm018a]

If the directory is writable by non-root users, unauthorized access The root directory should be protected from changes by non-root users. function correctly if it is not. If you are not using these tools, function correctly if it is not. If you are not using these tools, If the directory is writable by non-root users, unauthorized access The root directory should be protected from changes by non-root users.

Code [perm018a]

If the directory is writable by non-root users, unauthorized access

Code [perm018a]

The root directory should be protected from changes by non-root users.


















Code [perm018a]


Code [perm019a]












Code [perm018a]












If the directory is writable by non-root users, unauthorized access The root directory should be protected from changes by non-root users. then you should set the permissions to 644.

Code [perm018a]

or privileges can be obtained.

Code [perm019a]












The root directory should be protected from changes by non-root users.






















then you should set the permissions to 644.




The root directory should be protected from changes by non-root users.






The root directory should be protected from changes by non-root users.

The /etc directory should be owned by root and should not be writable If the directory is writable by non-root users, unauthorized access then you should set the permissions to 644. or privileges can be obtained. then you should set the permissions to 644. The root directory should be protected from changes by non-root users. If the directory is writable by non-root users, unauthorized access or privileges can be obtained.

Code [perm018a]

or privileges can be obtained. If the directory is writable by non-root users, unauthorized access

Code [perm018a]

then you should set the permissions to 644. If the directory is writable by non-root users, unauthorized access The root directory should be protected from changes by non-root users. The root directory should be protected from changes by non-root users.

Code [perm018a]

The root directory should be protected from changes by non-root users.

Code [perm018a]

The root directory should be protected from changes by non-root users. The /etc directory should be owned by root and should not be writable The root directory should be protected from changes by non-root users.

Code [perm018a]












or privileges can be obtained. If the directory is writable by non-root users, unauthorized access The /etc directory should be owned by root and should not be writable

Code [perm018a]

Code [perm018a]

If the directory is writable by non-root users, unauthorized access

Code [perm018a]

If the directory is writable by non-root users, unauthorized access























If the directory is writable by non-root users, unauthorized access






















or privileges can be obtained. by group or world. As shipped, SunOS 4 systems have the /etc directory or privileges can be obtained.






















The root directory should be protected from changes by non-root users.











The root directory should be protected from changes by non-root users. or privileges can be obtained. or privileges can be obtained. If the directory is writable by non-root users, unauthorized access




If the directory is writable by non-root users, unauthorized access







If the directory is writable by non-root users, unauthorized access The root directory should be protected from changes by non-root users. If the directory is writable by non-root users, unauthorized access The root directory should be protected from changes by non-root users. by group or world. As shipped, SunOS 4 systems have the /etc directory If the directory is writable by non-root users, unauthorized access

Code [perm018a]

If the directory is writable by non-root users, unauthorized access The root directory should be protected from changes by non-root users.












by group or world. As shipped, SunOS 4 systems have the /etc directory or privileges can be obtained.

Code [perm018a]

or privileges can be obtained. The root directory should be protected from changes by non-root users. The root directory should be protected from changes by non-root users.

Code [perm019a]

or privileges can be obtained. The root directory should be protected from changes by non-root users.

Code [perm019a]

Code [perm018a]

or privileges can be obtained.


owned by the user `bin'. This is *incorrect*.

Code [perm018a]


Code [perm019a]

Code [perm019a]












Code [perm018a]











or privileges can be obtained. If the directory is writable by non-root users, unauthorized access If the directory is writable by non-root users, unauthorized access or privileges can be obtained. If the directory is writable by non-root users, unauthorized access If the directory is writable by non-root users, unauthorized access or privileges can be obtained. or privileges can be obtained.

Code [perm019a]

or privileges can be obtained. The root directory should be protected from changes by non-root users. If the directory is writable by non-root users, unauthorized access owned by the user `bin'. This is *incorrect*. or privileges can be obtained.












If the directory is writable by non-root users, unauthorized access






If the directory is writable by non-root users, unauthorized access

The /etc directory should be owned by root and should not be writable


The root directory should be protected from changes by non-root users.


If the directory is writable by non-root users, unauthorized access







owned by the user `bin'. This is *incorrect*.




The /etc directory should be owned by root and should not be writable

Code [perm019a]












The root directory should be protected from changes by non-root users. The root directory should be protected from changes by non-root users.

Code [perm019a]

Code [perm019a]

The /etc directory should be owned by root and should not be writable

Code [perm019a]

The /etc directory should be owned by root and should not be writable The root directory should be protected from changes by non-root users.














or privileges can be obtained. or privileges can be obtained.











or privileges can be obtained.











or privileges can be obtained.











The /etc directory should be owned by root and should not be writable











or privileges can be obtained.





















If the directory is writable by non-root users, unauthorized access

Code [perm019a]

Code [perm019a]

Code [perm019a]

or privileges can be obtained. If the directory is writable by non-root users, unauthorized access or privileges can be obtained. by group or world. As shipped, SunOS 4 systems have the /etc directory or privileges can be obtained.












Code [perm019a]

The /etc directory should be owned by root and should not be writable If the directory is writable by non-root users, unauthorized access by group or world. As shipped, SunOS 4 systems have the /etc directory The /etc directory should be owned by root and should not be writable If the directory is writable by non-root users, unauthorized access by group or world. As shipped, SunOS 4 systems have the /etc directory

Code [perm020w]

The /etc directory should be owned by root and should not be writable by group or world. As shipped, SunOS 4 systems have the /etc directory If the directory is writable by non-root users, unauthorized access The /etc directory should be owned by root and should not be writable

Code [perm019a]

Code [perm019a]



Code [perm019a]












Code [perm019a]

Code [perm019a]


Code [perm020w]

Code [perm019a]


or privileges can be obtained.
by group or world. As shipped, SunOS 4 systems have the /etc directory














The /etc directory should be owned by root and should not be writable








The /etc directory should be owned by root and should not be writable The /etc directory should be owned by root and should not be writable or privileges can be obtained.




















Code [perm020w]

The /etc directory should be owned by root and should not be writable


owned by the user `bin'. This is *incorrect*.










owned by the user `bin'. This is *incorrect*. or privileges can be obtained. by group or world. As shipped, SunOS 4 systems have the /etc directory by group or world. As shipped, SunOS 4 systems have the /etc directory or privileges can be obtained. owned by the user `bin'. This is *incorrect*. The indicated disk device file is world readable, writable or both. This or privileges can be obtained. owned by the user `bin'. This is *incorrect*.

Code [perm019a]

by group or world. As shipped, SunOS 4 systems have the /etc directory by group or world. As shipped, SunOS 4 systems have the /etc directory The /etc directory should be owned by root and should not be writable

Code [perm019a]

Code [perm019a]

The /etc directory should be owned by root and should not be writable The /etc directory should be owned by root and should not be writable The /etc directory should be owned by root and should not be writable The /etc directory should be owned by root and should not be writable The /etc directory should be owned by root and should not be writable The indicated disk device file is world readable, writable or both. This

Code [perm019a]

Code [perm019a]












owned by the user `bin'. This is *incorrect*. by group or world. As shipped, SunOS 4 systems have the /etc directory

Code [perm019a]

Code [perm019a]

by group or world. As shipped, SunOS 4 systems have the /etc directory












Code [perm019a]

by group or world. As shipped, SunOS 4 systems have the /etc directory The indicated disk device file is world readable, writable or both. This











by group or world. As shipped, SunOS 4 systems have the /etc directory

owned by the user `bin'. This is *incorrect*. owned by the user `bin'. This is *incorrect*.




















































owned by the user `bin'. This is *incorrect*.

owned by the user `bin'. This is *incorrect*.






The /etc directory should be owned by root and should not be writable




allows the file access controls to be bypassed. The world permissions The /etc directory should be owned by root and should not be writable The /etc directory should be owned by root and should not be writable by group or world. As shipped, SunOS 4 systems have the /etc directory by group or world. As shipped, SunOS 4 systems have the /etc directory by group or world. As shipped, SunOS 4 systems have the /etc directory by group or world. As shipped, SunOS 4 systems have the /etc directory allows the file access controls to be bypassed. The world permissions

Code [perm019a]

by group or world. As shipped, SunOS 4 systems have the /etc directory by group or world. As shipped, SunOS 4 systems have the /etc directory The /etc directory should be owned by root and should not be writable The /etc directory should be owned by root and should not be writable


owned by the user `bin'. This is *incorrect*.










Code [perm019a]

The /etc directory should be owned by root and should not be writable The /etc directory should be owned by root and should not be writable owned by the user `bin'. This is *incorrect*.

Code [perm020w]

The /etc directory should be owned by root and should not be writable owned by the user `bin'. This is *incorrect*.

Code [perm020w]

allows the file access controls to be bypassed. The world permissions owned by the user `bin'. This is *incorrect*.

Code [perm019a]

Code [perm019a]























Code [perm020w]

Code [perm019a]

Code [perm020w]












should be removed.











by group or world. As shipped, SunOS 4 systems have the /etc directory owned by the user `bin'. This is *incorrect*. by group or world. As shipped, SunOS 4 systems have the /etc directory by group or world. As shipped, SunOS 4 systems have the /etc directory owned by the user `bin'. This is *incorrect*.

Code [perm020w]

owned by the user `bin'. This is *incorrect*. should be removed. owned by the user `bin'. This is *incorrect*. owned by the user `bin'. This is *incorrect*. The /etc directory should be owned by root and should not be writable


by group or world. As shipped, SunOS 4 systems have the /etc directory










by group or world. As shipped, SunOS 4 systems have the /etc directory owned by the user `bin'. This is *incorrect*. The /etc directory should be owned by root and should not be writable by group or world. As shipped, SunOS 4 systems have the /etc directory by group or world. As shipped, SunOS 4 systems have the /etc directory The indicated disk device file is world readable, writable or both. This






















Code [perm020w]

by group or world. As shipped, SunOS 4 systems have the /etc directory The indicated disk device file is world readable, writable or both. This should be removed.










Code [perm020w]


The /etc directory should be owned by root and should not be writable The /etc directory should be owned by root and should not be writable The /etc directory should be owned by root and should not be writable The indicated disk device file is world readable, writable or both. This The indicated disk device file is world readable, writable or both. This

Code [perm020w]

Code [perm020w]












owned by the user `bin'. This is *incorrect*.











owned by the user `bin'. This is *incorrect*. owned by the user `bin'. This is *incorrect*.














Code [perm020w]


















The indicated disk device file is world readable, writable or both. This











by group or world. As shipped, SunOS 4 systems have the /etc directory owned by the user `bin'. This is *incorrect*. owned by the user `bin'. This is *incorrect*.











Code [perm020w]

owned by the user `bin'. This is *incorrect*. by group or world. As shipped, SunOS 4 systems have the /etc directory

Code [perm020w]

allows the file access controls to be bypassed. The world permissions

Code [perm020w]

The indicated disk device file is world readable, writable or both. This owned by the user `bin'. This is *incorrect*. allows the file access controls to be bypassed. The world permissions owned by the user `bin'. This is *incorrect*.












by group or world. As shipped, SunOS 4 systems have the /etc directory The indicated disk device file is world readable, writable or both. This by group or world. As shipped, SunOS 4 systems have the /etc directory by group or world. As shipped, SunOS 4 systems have the /etc directory

Code [perm021w]

allows the file access controls to be bypassed. The world permissions The indicated disk device file is world readable, writable or both. This allows the file access controls to be bypassed. The world permissions The indicated disk device file is world readable, writable or both. This

Code [perm020w]












Code [perm020w]












Code [perm020w]

Code [perm021w]

Code [perm020w]

Code [perm020w]












The indicated disk device file is world readable, writable or both. This allows the file access controls to be bypassed. The world permissions owned by the user `bin'. This is *incorrect*.

Code [perm020w]















The indicated disk device file is world readable, writable or both. This











owned by the user `bin'. This is *incorrect*. The indicated disk device file is world readable, writable or both. This











should be removed. The indicated disk device file is world readable, writable or both. This











allows the file access controls to be bypassed. The world permissions should be removed.

Code [perm021w]

allows the file access controls to be bypassed. The world permissions owned by the user `bin'. This is *incorrect*. owned by the user `bin'. This is *incorrect*. should be removed. owned by the user `bin'. This is *incorrect*. The indicated disk device file is group readable, writable or both by the allows the file access controls to be bypassed. The world permissions should be removed. The indicated disk device file is world readable, writable or both. This

Code [perm020w]

allows the file access controls to be bypassed. The world permissions

Code [perm020w]

Code [perm020w]

The indicated disk device file is world readable, writable or both. This The indicated disk device file is group readable, writable or both by the The indicated disk device file is world readable, writable or both. This The indicated disk device file is world readable, writable or both. This allows the file access controls to be bypassed. The world permissions

Code [perm020w]

The indicated disk device file is world readable, writable or both. This should be removed.

Code [perm020w]


Code [perm020w]


The indicated disk device file is world readable, writable or both. This allows the file access controls to be bypassed. The world permissions

Code [perm020w]

Code [perm020w]

allows the file access controls to be bypassed. The world permissions























allows the file access controls to be bypassed. The world permissions The indicated disk device file is group readable, writable or both by the should be removed.











should be removed.
















should be removed.




























indicated group. This allows users in this group to bypass the file










The indicated disk device file is world readable, writable or both. This

should be removed. allows the file access controls to be bypassed. The world permissions The indicated disk device file is world readable, writable or both. This allows the file access controls to be bypassed. The world permissions The indicated disk device file is world readable, writable or both. This indicated group. This allows users in this group to bypass the file allows the file access controls to be bypassed. The world permissions The indicated disk device file is world readable, writable or both. This allows the file access controls to be bypassed. The world permissions

Code [perm020w]




allows the file access controls to be bypassed. The world permissions








The indicated disk device file is world readable, writable or both. This The indicated disk device file is world readable, writable or both. This should be removed. allows the file access controls to be bypassed. The world permissions should be removed.

Code [perm020w]

The indicated disk device file is world readable, writable or both. This should be removed.

Code [perm021w]

The indicated disk device file is world readable, writable or both. This indicated group. This allows users in this group to bypass the file

Code [perm021w]

should be removed.












Code [perm020w]

Code [perm020w]

Code [perm021w]

Code [perm021w]












Code [perm020w]

access controls. Many systems allow a group such as `operator' to have











allows the file access controls to be bypassed. The world permissions











should be removed. allows the file access controls to be bypassed. The world permissions should be removed. allows the file access controls to be bypassed. The world permissions access controls. Many systems allow a group such as `operator' to have

Code [perm021w]

should be removed. should be removed. allows the file access controls to be bypassed. The world permissions The indicated disk device file is world readable, writable or both. This should be removed.












allows the file access controls to be bypassed. The world permissions











allows the file access controls to be bypassed. The world permissions









should be removed.

The indicated disk device file is world readable, writable or both. This

allows the file access controls to be bypassed. The world permissions The indicated disk device file is group readable, writable or both by the allows the file access controls to be bypassed. The world permissions

Code [perm021w]

The indicated disk device file is group readable, writable or both by the The indicated disk device file is world readable, writable or both. This

Code [perm021w]

The indicated disk device file is world readable, writable or both. This

Code [perm021w]

The indicated disk device file is group readable, writable or both by the access controls. Many systems allow a group such as `operator' to have


The indicated disk device file is group readable, writable or both by the










Code [perm021w]

The indicated disk device file is world readable, writable or both. This







should be removed.





should be removed.


read access so that backups can be performed. Group write access is


read access so that backups can be performed. Group write access is







should be removed.
The indicated disk device file is group readable, writable or both by the



















should be removed.














Code [perm021w]

allows the file access controls to be bypassed. The world permissions

Code [perm021w]

Code [perm021w]

should be removed. should be removed. allows the file access controls to be bypassed. The world permissions should be removed.












indicated group. This allows users in this group to bypass the file indicated group. This allows users in this group to bypass the file

Code [perm021w]

The indicated disk device file is group readable, writable or both by the allows the file access controls to be bypassed. The world permissions The indicated disk device file is group readable, writable or both by the should be removed. allows the file access controls to be bypassed. The world permissions The indicated disk device file is group readable, writable or both by the read access so that backups can be performed. Group write access is The indicated disk device file is group readable, writable or both by the indicated group. This allows users in this group to bypass the file indicated group. This allows users in this group to bypass the file

Code [perm021w]

allows the file access controls to be bypassed. The world permissions

Code [perm021w]

Code [perm021w]

*not* needed and should be removed. If backups are performed by the












*not* needed and should be removed. If backups are performed by the

Code [perm021w]

indicated group. This allows users in this group to bypass the file






















Code [perm021w]

The indicated disk device file is group readable, writable or both by the should be removed. The indicated disk device file is group readable, writable or both by the












Code [perm021w]












The indicated disk device file is group readable, writable or both by the
should be removed.











access controls. Many systems allow a group such as `operator' to have access controls. Many systems allow a group such as `operator' to have indicated group. This allows users in this group to bypass the file indicated group. This allows users in this group to bypass the file











The indicated disk device file is group readable, writable or both by the should be removed. should be removed. The indicated disk device file is group readable, writable or both by the access controls. Many systems allow a group such as `operator' to have indicated group. This allows users in this group to bypass the file *not* needed and should be removed. If backups are performed by the access controls. Many systems allow a group such as `operator' to have indicated group. This allows users in this group to bypass the file

Code [perm021w]

should be removed. `root' account, then group read permissions are not needed and should The indicated disk device file is group readable, writable or both by the The indicated disk device file is group readable, writable or both by the

Code [perm021w]

Code [perm021w]

Code [perm021w]

`root' account, then group read permissions are not needed and should access controls. Many systems allow a group such as `operator' to have The indicated disk device file is group readable, writable or both by the The indicated disk device file is group readable, writable or both by the

Code [perm021w]

Code [perm021w]

Code [perm021w]

indicated group. This allows users in this group to bypass the file indicated group. This allows users in this group to bypass the file indicated group. This allows users in this group to bypass the file The indicated disk device file is group readable, writable or both by the












read access so that backups can be performed. Group write access is

Code [perm021w]

access controls. Many systems allow a group such as `operator' to have read access so that backups can be performed. Group write access is access controls. Many systems allow a group such as `operator' to have

























indicated group. This allows users in this group to bypass the file


access controls. Many systems allow a group such as `operator' to have read access so that backups can be performed. Group write access is `root' account, then group read permissions are not needed and should read access so that backups can be performed. Group write access is indicated group. This allows users in this group to bypass the file The indicated disk device file is group readable, writable or both by the access controls. Many systems allow a group such as `operator' to have indicated group. This allows users in this group to bypass the file indicated group. This allows users in this group to bypass the file The indicated disk device file is group readable, writable or both by the be removed.









The indicated disk device file is group readable, writable or both by the


The indicated disk device file is group readable, writable or both by the read access so that backups can be performed. Group write access is be removed. indicated group. This allows users in this group to bypass the file indicated group. This allows users in this group to bypass the file The indicated disk device file is group readable, writable or both by the The indicated disk device file is group readable, writable or both by the

Code [perm021w]

access controls. Many systems allow a group such as `operator' to have The indicated disk device file is group readable, writable or both by the access controls. Many systems allow a group such as `operator' to have access controls. Many systems allow a group such as `operator' to have *not* needed and should be removed. If backups are performed by the indicated group. This allows users in this group to bypass the file

Code [perm021w]

Code [perm021w]

read access so that backups can be performed. Group write access is read access so that backups can be performed. Group write access is

Code [perm021w]

access controls. Many systems allow a group such as `operator' to have The indicated disk device file is group readable, writable or both by the read access so that backups can be performed. Group write access is *not* needed and should be removed. If backups are performed by the *not* needed and should be removed. If backups are performed by the indicated group. This allows users in this group to bypass the file be removed.

Code [perm021w]

access controls. Many systems allow a group such as `operator' to have indicated group. This allows users in this group to bypass the file *not* needed and should be removed. If backups are performed by the












access controls. Many systems allow a group such as `operator' to have read access so that backups can be performed. Group write access is access controls. Many systems allow a group such as `operator' to have indicated group. This allows users in this group to bypass the file











indicated group. This allows users in this group to bypass the file access controls. Many systems allow a group such as `operator' to have access controls. Many systems allow a group such as `operator' to have *not* needed and should be removed. If backups are performed by the indicated group. This allows users in this group to bypass the file indicated group. This allows users in this group to bypass the file read access so that backups can be performed. Group write access is indicated group. This allows users in this group to bypass the file The indicated disk device file is group readable, writable or both by the The indicated disk device file is group readable, writable or both by the `root' account, then group read permissions are not needed and should read access so that backups can be performed. Group write access is access controls. Many systems allow a group such as `operator' to have The indicated disk device file is group readable, writable or both by the read access so that backups can be performed. Group write access is *not* needed and should be removed. If backups are performed by the *not* needed and should be removed. If backups are performed by the The indicated disk device file is group readable, writable or both by the read access so that backups can be performed. Group write access is *not* needed and should be removed. If backups are performed by the indicated group. This allows users in this group to bypass the file `root' account, then group read permissions are not needed and should `root' account, then group read permissions are not needed and should access controls. Many systems allow a group such as `operator' to have read access so that backups can be performed. Group write access is access controls. Many systems allow a group such as `operator' to have

Code [perm022w]












`root' account, then group read permissions are not needed and should

Code [perm022w]

The indicated disk device file is group readable, writable or both by the *not* needed and should be removed. If backups are performed by the access controls. Many systems allow a group such as `operator' to have read access so that backups can be performed. Group write access is read access so that backups can be performed. Group write access is read access so that backups can be performed. Group write access is `root' account, then group read permissions are not needed and should access controls. Many systems allow a group such as `operator' to have read access so that backups can be performed. Group write access is access controls. Many systems allow a group such as `operator' to have *not* needed and should be removed. If backups are performed by the access controls. Many systems allow a group such as `operator' to have access controls. Many systems allow a group such as `operator' to have indicated group. This allows users in this group to bypass the file be removed. indicated group. This allows users in this group to bypass the file *not* needed and should be removed. If backups are performed by the `root' account, then group read permissions are not needed and should indicated group. This allows users in this group to bypass the file read access so that backups can be performed. Group write access is *not* needed and should be removed. If backups are performed by the `root' account, then group read permissions are not needed and should indicated group. This allows users in this group to bypass the file *not* needed and should be removed. If backups are performed by the `root' account, then group read permissions are not needed and should access controls. Many systems allow a group such as `operator' to have be removed.

Code [perm022w]

read access so that backups can be performed. Group write access is *not* needed and should be removed. If backups are performed by the be removed. The indicated disk device file is not owned by `root'. This allows the read access so that backups can be performed. Group write access is indicated group. This allows users in this group to bypass the file The indicated disk device file is not owned by `root'. This allows the read access so that backups can be performed. Group write access is be removed. `root' account, then group read permissions are not needed and should *not* needed and should be removed. If backups are performed by the *not* needed and should be removed. If backups are performed by the *not* needed and should be removed. If backups are performed by the *not* needed and should be removed. If backups are performed by the be removed. read access so that backups can be performed. Group write access is read access so that backups can be performed. Group write access is read access so that backups can be performed. Group write access is `root' account, then group read permissions are not needed and should access controls. Many systems allow a group such as `operator' to have












read access so that backups can be performed. Group write access is `root' account, then group read permissions are not needed and should access controls. Many systems allow a group such as `operator' to have be removed. be removed. `root' account, then group read permissions are not needed and should access controls. Many systems allow a group such as `operator' to have `root' account, then group read permissions are not needed and should *not* needed and should be removed. If backups are performed by the access controls. Many systems allow a group such as `operator' to have be removed.











The indicated disk device file is not owned by `root'. This allows the read access so that backups can be performed. Group write access is `root' account, then group read permissions are not needed and should *not* needed and should be removed. If backups are performed by the *not* needed and should be removed. If backups are performed by the access controls. Many systems allow a group such as `operator' to have owner of the disk device to bypass the systems file access controls.










be removed.
*not* needed and should be removed. If backups are performed by the

`root' account, then group read permissions are not needed and should

owner of the disk device to bypass the systems file access controls.










`root' account, then group read permissions are not needed and should `root' account, then group read permissions are not needed and should `root' account, then group read permissions are not needed and should *not* needed and should be removed. If backups are performed by the

Code [perm022w]


*not* needed and should be removed. If backups are performed by the *not* needed and should be removed. If backups are performed by the be removed. *not* needed and should be removed. If backups are performed by the read access so that backups can be performed. Group write access is be removed. read access so that backups can be performed. Group write access is















Code [perm022w]

be removed. read access so that backups can be performed. Group write access is read access so that backups can be performed. Group write access is












`root' account, then group read permissions are not needed and should owner of the disk device to bypass the systems file access controls. be removed. be removed.

Code [perm022w]

Code [perm022w]

The owner should be changed to `root'. `root' account, then group read permissions are not needed and should read access so that backups can be performed. Group write access is `root' account, then group read permissions are not needed and should *not* needed and should be removed. If backups are performed by the


The owner should be changed to `root'.










Code [perm022w]

`root' account, then group read permissions are not needed and should be removed. be removed. be removed. be removed. `root' account, then group read permissions are not needed and should The indicated disk device file is not owned by `root'. This allows the `root' account, then group read permissions are not needed and should











`root' account, then group read permissions are not needed and should

`root' account, then group read permissions are not needed and should

Code [perm022w]

*not* needed and should be removed. If backups are performed by the












Code [perm022w]

*not* needed and should be removed. If backups are performed by the The indicated disk device file is not owned by `root'. This allows the

Code [perm022w]












*not* needed and should be removed. If backups are performed by the











*not* needed and should be removed. If backups are performed by the be removed. The indicated disk device file is not owned by `root'. This allows the The owner should be changed to `root'. The indicated disk device file is not owned by `root'. This allows the











be removed.











be removed.

Code [perm022w]

`root' account, then group read permissions are not needed and should *not* needed and should be removed. If backups are performed by the










The indicated disk device file is not owned by `root'. This allows the


be removed.

Code [perm022w]





































be removed. be removed.


owner of the disk device to bypass the systems file access controls.

Code [perm022w]

be removed. `root' account, then group read permissions are not needed and should The indicated disk device file is not owned by `root'. This allows the The indicated disk device file is not owned by `root'. This allows the be removed.

Code [perm022w]

The indicated disk device file is not owned by `root'. This allows the

Code [perm022w]

owner of the disk device to bypass the systems file access controls. `root' account, then group read permissions are not needed and should `root' account, then group read permissions are not needed and should `root' account, then group read permissions are not needed and should

Code [perm023a]

Code [perm022w]

owner of the disk device to bypass the systems file access controls.







owner of the disk device to bypass the systems file access controls.






































Code [perm023a]

be removed. The indicated disk device file is not owned by `root'. This allows the

Code [perm022w]

Code [perm022w]

Code [perm022w]

owner of the disk device to bypass the systems file access controls.

Code [perm022w]

`root' account, then group read permissions are not needed and should






















The indicated disk device file is not owned by `root'. This allows the

The owner should be changed to `root'.











The indicated disk device file is not owned by `root'. This allows the
be removed.











owner of the disk device to bypass the systems file access controls. owner of the disk device to bypass the systems file access controls.











The indicated disk device file is not owned by `root'. This allows the The indicated disk device file is not owned by `root'. This allows the owner of the disk device to bypass the systems file access controls. The owner should be changed to `root'. be removed. be removed. be removed. The indicated file has the setuid bit set, but it should not have it.

Code [perm022w]

Code [perm023a]

Code [perm022w]

The owner should be changed to `root'. The indicated disk device file is not owned by `root'. This allows the

Code [perm022w]

The owner should be changed to `root'. The indicated disk device file is not owned by `root'. This allows the

Code [perm022w]

The indicated file has the setuid bit set, but it should not have it.

Code [perm022w]












The owner should be changed to `root'. owner of the disk device to bypass the systems file access controls. The indicated disk device file is not owned by `root'. This allows the The indicated disk device file is not owned by `root'. This allows the The indicated disk device file is not owned by `root'. This allows the

Code [perm022w]

be removed. owner of the disk device to bypass the systems file access controls.












Code [perm022w]

Code [perm022w]

owner of the disk device to bypass the systems file access controls.












The owner should be changed to `root'. The owner should be changed to `root'. The owner should be changed to `root'. owner of the disk device to bypass the systems file access controls. owner of the disk device to bypass the systems file access controls.















This should be changed by using 'chmod u-s file' where 'file' is the















The indicated file has the setuid bit set, but it should not have it.










The indicated disk device file is not owned by `root'. This allows the
The indicated disk device file is not owned by `root'. This allows the








owner of the disk device to bypass the systems file access controls.
















The indicated disk device file is not owned by `root'. This allows the

Code [perm022w]

owner of the disk device to bypass the systems file access controls. The indicated disk device file is not owned by `root'. This allows the












The owner should be changed to `root'. This should be changed by using 'chmod u-s file' where 'file' is the owner of the disk device to bypass the systems file access controls. owner of the disk device to bypass the systems file access controls. The indicated disk device file is not owned by `root'. This allows the The indicated disk device file is not owned by `root'. This allows the owner of the disk device to bypass the systems file access controls. The owner should be changed to `root'.

Code [perm023a]












Code [perm022w]

The owner should be changed to `root'. The indicated disk device file is not owned by `root'. This allows the The indicated disk device file is not owned by `root'. This allows the

Code [perm023a]























The owner should be changed to `root'. The owner should be changed to `root'.





Code [perm022w]


Code [perm022w]

Code [perm022w]

Code [perm023a]

Code [perm023a]

indicated file. The system should be checked for signs of intrusion. This should be changed by using 'chmod u-s file' where 'file' is the owner of the disk device to bypass the systems file access controls. The owner should be changed to `root'.

Code [perm023a]

owner of the disk device to bypass the systems file access controls. The indicated disk device file is not owned by `root'. This allows the owner of the disk device to bypass the systems file access controls.












owner of the disk device to bypass the systems file access controls. The owner should be changed to `root'. owner of the disk device to bypass the systems file access controls. indicated file. The system should be checked for signs of intrusion.











Code [perm022w]

The owner should be changed to `root'. owner of the disk device to bypass the systems file access controls. The indicated file has the setuid bit set, but it should not have it. The owner should be changed to `root'. The owner should be changed to `root'. The indicated disk device file is not owned by `root'. This allows the

Code [perm023a]

The indicated file has the setuid bit set, but it should not have it. owner of the disk device to bypass the systems file access controls.












Code [perm023a]

owner of the disk device to bypass the systems file access controls.

Code [perm023a]












The indicated disk device file is not owned by `root'. This allows the











The indicated disk device file is not owned by `root'. This allows the The indicated file has the setuid bit set, but it should not have it. The indicated file has the setuid bit set, but it should not have it. The indicated disk device file is not owned by `root'. This allows the indicated file. The system should be checked for signs of intrusion.











The owner should be changed to `root'.











The owner should be changed to `root'. The indicated file has the setuid bit set, but it should not have it. owner of the disk device to bypass the systems file access controls.

Code [perm023a]

The owner should be changed to `root'.

Code [perm023a]























The owner should be changed to `root'.

Code [perm023a]

The owner should be changed to `root'. The indicated disk device file is not owned by `root'. This allows the The owner should be changed to `root'.














This should be changed by using 'chmod u-s file' where 'file' is the









owner of the disk device to bypass the systems file access controls.











The owner should be changed to `root'. The indicated file has the setuid bit set, but it should not have it. This should be changed by using 'chmod u-s file' where 'file' is the

Code [perm023a]

The indicated file has the setuid bit set, but it should not have it.

Code [perm023a]

The indicated file has the setuid bit set, but it should not have it. The owner should be changed to `root'. owner of the disk device to bypass the systems file access controls.

Code [perm024a]

owner of the disk device to bypass the systems file access controls. This should be changed by using 'chmod u-s file' where 'file' is the This should be changed by using 'chmod u-s file' where 'file' is the owner of the disk device to bypass the systems file access controls.

Code [perm023a]















This should be changed by using 'chmod u-s file' where 'file' is the The owner should be changed to `root'.







The indicated file has the setuid bit set, but it should not have it.




The indicated file has the setuid bit set, but it should not have it.

Code [perm024a]


Code [perm023a]

Code [perm023a]








Code [perm023a]


Code [perm023a]

The indicated file has the setuid bit set, but it should not have it. owner of the disk device to bypass the systems file access controls.















The owner should be changed to `root'. This should be changed by using 'chmod u-s file' where 'file' is the











indicated file. The system should be checked for signs of intrusion. The indicated file has the setuid bit set, but it should not have it. This should be changed by using 'chmod u-s file' where 'file' is the The indicated file has the setuid bit set, but it should not have it. indicated file. The system should be checked for signs of intrusion. This should be changed by using 'chmod u-s file' where 'file' is the











The owner should be changed to `root'. The indicated file has the setgid (group) bit set, but it should not The owner should be changed to `root'.

Code [perm024a]

indicated file. The system should be checked for signs of intrusion. The owner should be changed to `root'. The indicated file has the setuid bit set, but it should not have it. indicated file. The system should be checked for signs of intrusion.

Code [perm023a]

Code [perm023a]

Code [perm023a]

This should be changed by using 'chmod u-s file' where 'file' is the indicated file. The system should be checked for signs of intrusion.







The indicated file has the setgid (group) bit set, but it should not





This should be changed by using 'chmod u-s file' where 'file' is the

Code [perm023a]

Code [perm023a]

Code [perm023a]

The indicated file has the setuid bit set, but it should not have it. The owner should be changed to `root'. The indicated file has the setuid bit set, but it should not have it.

Code [perm023a]

The indicated file has the setuid bit set, but it should not have it. The indicated file has the setuid bit set, but it should not have it. This should be changed by using 'chmod u-s file' where 'file' is the indicated file. The system should be checked for signs of intrusion.

Code [perm023a]

This should be changed by using 'chmod u-s file' where 'file' is the




This should be changed by using 'chmod u-s file' where 'file' is the

indicated file. The system should be checked for signs of intrusion.





























indicated file. The system should be checked for signs of intrusion.






















This should be changed by using 'chmod u-s file' where 'file' is the The indicated file has the setgid (group) bit set, but it should not

have it. This should be changed by using 'chmod g-s file' where 'file'
































The indicated file has the setuid bit set, but it should not have it. The indicated file has the setuid bit set, but it should not have it.

Code [perm023a]

The indicated file has the setuid bit set, but it should not have it. indicated file. The system should be checked for signs of intrusion. have it. This should be changed by using 'chmod g-s file' where 'file'

The indicated file has the setuid bit set, but it should not have it.











indicated file. The system should be checked for signs of intrusion. The indicated file has the setuid bit set, but it should not have it. This should be changed by using 'chmod u-s file' where 'file' is the The indicated file has the setuid bit set, but it should not have it. This should be changed by using 'chmod u-s file' where 'file' is the This should be changed by using 'chmod u-s file' where 'file' is the This should be changed by using 'chmod u-s file' where 'file' is the






Code [perm023a]


indicated file. The system should be checked for signs of intrusion.

Code [perm024a]









The indicated file has the setuid bit set, but it should not have it.



Code [perm024a]



The indicated file has the setuid bit set, but it should not have it.









indicated file. The system should be checked for signs of intrusion.

Code [perm023a]

indicated file. The system should be checked for signs of intrusion.

Code [perm023a]












Code [perm023a]

Code [perm024a]

Code [perm024a]

is the indicated file. The system should be checked for signs of indicated file. The system should be checked for signs of intrusion. This should be changed by using 'chmod u-s file' where 'file' is the have it. This should be changed by using 'chmod g-s file' where 'file' This should be changed by using 'chmod u-s file' where 'file' is the The indicated file has the setuid bit set, but it should not have it.












This should be changed by using 'chmod u-s file' where 'file' is the

Code [perm024a]

is the indicated file. The system should be checked for signs of












This should be changed by using 'chmod u-s file' where 'file' is the This should be changed by using 'chmod u-s file' where 'file' is the indicated file. The system should be checked for signs of intrusion. indicated file. The system should be checked for signs of intrusion.

Code [perm023a]

This should be changed by using 'chmod u-s file' where 'file' is the indicated file. The system should be checked for signs of intrusion. indicated file. The system should be checked for signs of intrusion.









The indicated file has the setgid (group) bit set, but it should not



Code [perm024a]

Code [perm024a]

This should be changed by using 'chmod u-s file' where 'file' is the The indicated file has the setuid bit set, but it should not have it.

Code [perm024a]

The indicated file has the setgid (group) bit set, but it should not


The indicated file has the setuid bit set, but it should not have it. The indicated file has the setuid bit set, but it should not have it. This should be changed by using 'chmod u-s file' where 'file' is the











intrusion. The indicated file has the setuid bit set, but it should not have it. is the indicated file. The system should be checked for signs of The indicated file has the setgid (group) bit set, but it should not indicated file. The system should be checked for signs of intrusion.




Code [perm024a]

The indicated file has the setgid (group) bit set, but it should not


Code [perm024a]

indicated file. The system should be checked for signs of intrusion. This should be changed by using 'chmod u-s file' where 'file' is the indicated file. The system should be checked for signs of intrusion. The indicated file has the setgid (group) bit set, but it should not intrusion. indicated file. The system should be checked for signs of intrusion.























indicated file. The system should be checked for signs of intrusion.

Code [perm024a]

indicated file. The system should be checked for signs of intrusion. The indicated file has the setuid bit set, but it should not have it.























The indicated file has the setgid (group) bit set, but it should not have it. This should be changed by using 'chmod g-s file' where 'file' The indicated file has the setgid (group) bit set, but it should not indicated file. The system should be checked for signs of intrusion.

Code [perm024a]

Code [perm024a]

have it. This should be changed by using 'chmod g-s file' where 'file' This should be changed by using 'chmod u-s file' where 'file' is the The indicated file has the setgid (group) bit set, but it should not This should be changed by using 'chmod u-s file' where 'file' is the indicated file. The system should be checked for signs of intrusion. This should be changed by using 'chmod u-s file' where 'file' is the

Code [perm024a]

intrusion.












This should be changed by using 'chmod u-s file' where 'file' is the











have it. This should be changed by using 'chmod g-s file' where 'file' have it. This should be changed by using 'chmod g-s file' where 'file' The indicated file has the setgid (group) bit set, but it should not indicated file. The system should be checked for signs of intrusion.











Code [perm024a]

The indicated file has the setgid (group) bit set, but it should not

Code [perm024a]












Code [perm024a]

have it. This should be changed by using 'chmod g-s file' where 'file'

Code [perm024a]






















The indicated file has the setgid (group) bit set, but it should not

This should be changed by using 'chmod u-s file' where 'file' is the have it. This should be changed by using 'chmod g-s file' where 'file' have it. This should be changed by using 'chmod g-s file' where 'file'
The indicated file has the setgid (group) bit set, but it should not











The indicated file has the setgid (group) bit set, but it should not is the indicated file. The system should be checked for signs of is the indicated file. The system should be checked for signs of have it. This should be changed by using 'chmod g-s file' where 'file' indicated file. The system should be checked for signs of intrusion.

Code [perm025w]

Code [perm024a]

indicated file. The system should be checked for signs of intrusion. indicated file. The system should be checked for signs of intrusion.















The indicated file has the setgid (group) bit set, but it should not

indicated file. The system should be checked for signs of intrusion. is the indicated file. The system should be checked for signs of

Code [perm024a]

is the indicated file. The system should be checked for signs of have it. This should be changed by using 'chmod g-s file' where 'file'

Code [perm024a]

The indicated file has the setgid (group) bit set, but it should not have it. This should be changed by using 'chmod g-s file' where 'file'

Code [perm024a]

Code [perm024a]

Code [perm024a]

Code [perm025w]


The indicated file has the setgid (group) bit set, but it should not is the indicated file. The system should be checked for signs of The indicated file has the setgid (group) bit set, but it should not have it. This should be changed by using 'chmod g-s file' where 'file' The indicated file has the setgid (group) bit set, but it should not indicated file. The system should be checked for signs of intrusion. is the indicated file. The system should be checked for signs of

Code [perm024a]

have it. This should be changed by using 'chmod g-s file' where 'file' have it. This should be changed by using 'chmod g-s file' where 'file' is the indicated file. The system should be checked for signs of intrusion. intrusion. is the indicated file. The system should be checked for signs of If the 'arp' program is 'setgid', it can be used to read files that a user The indicated file has the setgid (group) bit set, but it should not

Code [perm025w]












Code [perm024a]
















have it. This should be changed by using 'chmod g-s file' where 'file'











intrusion. is the indicated file. The system should be checked for signs of The indicated file has the setgid (group) bit set, but it should not intrusion. The indicated file has the setgid (group) bit set, but it should not

Code [perm024a]

is the indicated file. The system should be checked for signs of have it. This should be changed by using 'chmod g-s file' where 'file' The indicated file has the setgid (group) bit set, but it should not The indicated file has the setgid (group) bit set, but it should not intrusion. have it. This should be changed by using 'chmod g-s file' where 'file' have it. This should be changed by using 'chmod g-s file' where 'file' The indicated file has the setgid (group) bit set, but it should not If the 'arp' program is 'setgid', it can be used to read files that a user is the indicated file. The system should be checked for signs of












have it. This should be changed by using 'chmod g-s file' where 'file' intrusion. is the indicated file. The system should be checked for signs of The indicated file has the setgid (group) bit set, but it should not is the indicated file. The system should be checked for signs of intrusion.











Code [perm024a]

Code [perm024a]

intrusion.

Code [perm024a]

normally should not be able to read. On many systems, this includes have it. This should be changed by using 'chmod g-s file' where 'file'

Code [perm024a]












The indicated file has the setgid (group) bit set, but it should not is the indicated file. The system should be checked for signs of If the 'arp' program is 'setgid', it can be used to read files that a user have it. This should be changed by using 'chmod g-s file' where 'file' intrusion.











have it. This should be changed by using 'chmod g-s file' where 'file' intrusion. The indicated file has the setgid (group) bit set, but it should not have it. This should be changed by using 'chmod g-s file' where 'file' is the indicated file. The system should be checked for signs of normally should not be able to read. On many systems, this includes










is the indicated file. The system should be checked for signs of

Code [perm024a]


have it. This should be changed by using 'chmod g-s file' where 'file'










is the indicated file. The system should be checked for signs of intrusion. have it. This should be changed by using 'chmod g-s file' where 'file'









intrusion.


Code [perm025w]

intrusion. is the indicated file. The system should be checked for signs of have it. This should be changed by using 'chmod g-s file' where 'file'

Code [perm025w]












The indicated file has the setgid (group) bit set, but it should not











The indicated file has the setgid (group) bit set, but it should not The indicated file has the setgid (group) bit set, but it should not have it. This should be changed by using 'chmod g-s file' where 'file' is the indicated file. The system should be checked for signs of intrusion. normally should not be able to read. On many systems, this includes /dev/kmem and /dev/mem. Turning the 'setgid' bit off will result in the

Code [perm025w]

The indicated file has the setgid (group) bit set, but it should not is the indicated file. The system should be checked for signs of












is the indicated file. The system should be checked for signs of

Code [perm025w]

Code [perm025w]

/dev/kmem and /dev/mem. Turning the 'setgid' bit off will result in the have it. This should be changed by using 'chmod g-s file' where 'file' is the indicated file. The system should be checked for signs of intrusion. is the indicated file. The system should be checked for signs of intrusion. The indicated file has the setgid (group) bit set, but it should not is the indicated file. The system should be checked for signs of












intrusion.

Code [perm025w]












intrusion.











If the 'arp' program is 'setgid', it can be used to read files that a user

Code [perm025w]












Code [perm025w]

If the 'arp' program is 'setgid', it can be used to read files that a user is the indicated file. The system should be checked for signs of have it. This should be changed by using 'chmod g-s file' where 'file' have it. This should be changed by using 'chmod g-s file' where 'file' intrusion. have it. This should be changed by using 'chmod g-s file' where 'file'







Code [perm025w]


/dev/kmem and /dev/mem. Turning the 'setgid' bit off will result in the is the indicated file. The system should be checked for signs of intrusion. have it. This should be changed by using 'chmod g-s file' where 'file' If the 'arp' program is 'setgid', it can be used to read files that a user intrusion. loss of 'arp -a' functionality for a normal user account. (On SunOS 5.x If the 'arp' program is 'setgid', it can be used to read files that a user loss of 'arp -a' functionality for a normal user account. (On SunOS 5.x

Code [perm025w]

is the indicated file. The system should be checked for signs of intrusion. intrusion. If the 'arp' program is 'setgid', it can be used to read files that a user intrusion.









Code [perm025w]


have it. This should be changed by using 'chmod g-s file' where 'file'

Code [perm025w]

If the 'arp' program is 'setgid', it can be used to read files that a user
























Code [perm025w]

normally should not be able to read. On many systems, this includes intrusion. If the 'arp' program is 'setgid', it can be used to read files that a user If the 'arp' program is 'setgid', it can be used to read files that a user is the indicated file. The system should be checked for signs of normally should not be able to read. On many systems, this includes

Code [perm025w]

is the indicated file. The system should be checked for signs of












If the 'arp' program is 'setgid', it can be used to read files that a user loss of 'arp -a' functionality for a normal user account. (On SunOS 5.x is the indicated file. The system should be checked for signs of intrusion.











normally should not be able to read. On many systems, this includes

is the indicated file. The system should be checked for signs of










normally should not be able to read. On many systems, this includes systems, even this functionality isn't lost... there is no reason for systems, even this functionality isn't lost... there is no reason for

Code [perm025w]

intrusion. normally should not be able to read. On many systems, this includes

Code [perm025w]

If the 'arp' program is 'setgid', it can be used to read files that a user

Code [perm025w]

























Code [perm025w]

is the indicated file. The system should be checked for signs of


If the 'arp' program is 'setgid', it can be used to read files that a user If the 'arp' program is 'setgid', it can be used to read files that a user normally should not be able to read. On many systems, this includes If the 'arp' program is 'setgid', it can be used to read files that a user /dev/kmem and /dev/mem. Turning the 'setgid' bit off will result in the normally should not be able to read. On many systems, this includes normally should not be able to read. On many systems, this includes





intrusion.





Code [perm025w]


If the 'arp' program is 'setgid', it can be used to read files that a user intrusion.

Code [perm025w]

/dev/kmem and /dev/mem. Turning the 'setgid' bit off will result in the normally should not be able to read. On many systems, this includes












intrusion.

Code [perm025w]

systems, even this functionality isn't lost... there is no reason for /dev/kmem and /dev/mem. Turning the 'setgid' bit off will result in the intrusion. /dev/kmem and /dev/mem. Turning the 'setgid' bit off will result in the

Code [perm025w]

'arp' to be setgid). This is a minor loss of functionality. If the 'arp' program is 'setgid', it can be used to read files that a user

Code [perm025w]

Code [perm025w]

If the 'arp' program is 'setgid', it can be used to read files that a user 'arp' to be setgid). This is a minor loss of functionality. If the 'arp' program is 'setgid', it can be used to read files that a user normally should not be able to read. On many systems, this includes /dev/kmem and /dev/mem. Turning the 'setgid' bit off will result in the










intrusion.


normally should not be able to read. On many systems, this includes If the 'arp' program is 'setgid', it can be used to read files that a user normally should not be able to read. On many systems, this includes /dev/kmem and /dev/mem. Turning the 'setgid' bit off will result in the normally should not be able to read. On many systems, this includes loss of 'arp -a' functionality for a normal user account. (On SunOS 5.x /dev/kmem and /dev/mem. Turning the 'setgid' bit off will result in the /dev/kmem and /dev/mem. Turning the 'setgid' bit off will result in the

Code [perm025w]

If the 'arp' program is 'setgid', it can be used to read files that a user normally should not be able to read. On many systems, this includes

Code [perm025w]

If the 'arp' program is 'setgid', it can be used to read files that a user























loss of 'arp -a' functionality for a normal user account. (On SunOS 5.x











/dev/kmem and /dev/mem. Turning the 'setgid' bit off will result in the If the 'arp' program is 'setgid', it can be used to read files that a user 'arp' to be setgid). This is a minor loss of functionality. loss of 'arp -a' functionality for a normal user account. (On SunOS 5.x











If the 'arp' program is 'setgid', it can be used to read files that a user loss of 'arp -a' functionality for a normal user account. (On SunOS 5.x If the 'arp' program is 'setgid', it can be used to read files that a user










Code [perm025w]


normally should not be able to read. On many systems, this includes normally should not be able to read. On many systems, this includes normally should not be able to read. On many systems, this includes











If the 'arp' program is 'setgid', it can be used to read files that a user loss of 'arp -a' functionality for a normal user account. (On SunOS 5.x











/dev/kmem and /dev/mem. Turning the 'setgid' bit off will result in the normally should not be able to read. On many systems, this includes /dev/kmem and /dev/mem. Turning the 'setgid' bit off will result in the /dev/kmem and /dev/mem. Turning the 'setgid' bit off will result in the loss of 'arp -a' functionality for a normal user account. (On SunOS 5.x /dev/kmem and /dev/mem. Turning the 'setgid' bit off will result in the systems, even this functionality isn't lost... there is no reason for loss of 'arp -a' functionality for a normal user account. (On SunOS 5.x loss of 'arp -a' functionality for a normal user account. (On SunOS 5.x normally should not be able to read. On many systems, this includes If the 'arp' program is 'setgid', it can be used to read files that a user /dev/kmem and /dev/mem. Turning the 'setgid' bit off will result in the

Code [perm025w]

If the 'arp' program is 'setgid', it can be used to read files that a user normally should not be able to read. On many systems, this includes

Code [perm025w]

Code [perm025w]

systems, even this functionality isn't lost... there is no reason for normally should not be able to read. On many systems, this includes loss of 'arp -a' functionality for a normal user account. (On SunOS 5.x


Code [perm025w]


systems, even this functionality isn't lost... there is no reason for

Code [perm26f]

normally should not be able to read. On many systems, this includes systems, even this functionality isn't lost... there is no reason for normally should not be able to read. On many systems, this includes

Code [perm025w]

/dev/kmem and /dev/mem. Turning the 'setgid' bit off will result in the

Code [perm26f]

/dev/kmem and /dev/mem. Turning the 'setgid' bit off will result in the If the 'arp' program is 'setgid', it can be used to read files that a user normally should not be able to read. On many systems, this includes /dev/kmem and /dev/mem. Turning the 'setgid' bit off will result in the systems, even this functionality isn't lost... there is no reason for /dev/kmem and /dev/mem. Turning the 'setgid' bit off will result in the loss of 'arp -a' functionality for a normal user account. (On SunOS 5.x loss of 'arp -a' functionality for a normal user account. (On SunOS 5.x loss of 'arp -a' functionality for a normal user account. (On SunOS 5.x loss of 'arp -a' functionality for a normal user account. (On SunOS 5.x systems, even this functionality isn't lost... there is no reason for 'arp' to be setgid). This is a minor loss of functionality. systems, even this functionality isn't lost... there is no reason for /dev/kmem and /dev/mem. Turning the 'setgid' bit off will result in the systems, even this functionality isn't lost... there is no reason for normally should not be able to read. On many systems, this includes loss of 'arp -a' functionality for a normal user account. (On SunOS 5.x normally should not be able to read. On many systems, this includes If the 'arp' program is 'setgid', it can be used to read files that a user If the 'arp' program is 'setgid', it can be used to read files that a user /dev/kmem and /dev/mem. Turning the 'setgid' bit off will result in the

Code [perm26f]

If the 'arp' program is 'setgid', it can be used to read files that a user systems, even this functionality isn't lost... there is no reason for 'arp' to be setgid). This is a minor loss of functionality. /dev/kmem and /dev/mem. Turning the 'setgid' bit off will result in the 'arp' to be setgid). This is a minor loss of functionality. If the 'arp' program is 'setgid', it can be used to read files that a user The file '/etc/login.access' provides finer control over user /dev/kmem and /dev/mem. Turning the 'setgid' bit off will result in the 'arp' to be setgid). This is a minor loss of functionality. If the 'arp' program is 'setgid', it can be used to read files that a user /dev/kmem and /dev/mem. Turning the 'setgid' bit off will result in the loss of 'arp -a' functionality for a normal user account. (On SunOS 5.x The file '/etc/login.access' provides finer control over user loss of 'arp -a' functionality for a normal user account. (On SunOS 5.x /dev/kmem and /dev/mem. Turning the 'setgid' bit off will result in the systems, even this functionality isn't lost... there is no reason for normally should not be able to read. On many systems, this includes loss of 'arp -a' functionality for a normal user account. (On SunOS 5.x systems, even this functionality isn't lost... there is no reason for systems, even this functionality isn't lost... there is no reason for systems, even this functionality isn't lost... there is no reason for 'arp' to be setgid). This is a minor loss of functionality. loss of 'arp -a' functionality for a normal user account. (On SunOS 5.x 'arp' to be setgid). This is a minor loss of functionality. 'arp' to be setgid). This is a minor loss of functionality. loss of 'arp -a' functionality for a normal user account. (On SunOS 5.x 'arp' to be setgid). This is a minor loss of functionality.












systems, even this functionality isn't lost... there is no reason for /dev/kmem and /dev/mem. Turning the 'setgid' bit off will result in the /dev/kmem and /dev/mem. Turning the 'setgid' bit off will result in the normally should not be able to read. On many systems, this includes normally should not be able to read. On many systems, this includes loss of 'arp -a' functionality for a normal user account. (On SunOS 5.x The file '/etc/login.access' provides finer control over user 'arp' to be setgid). This is a minor loss of functionality.











loss of 'arp -a' functionality for a normal user account. (On SunOS 5.x normally should not be able to read. On many systems, this includes loss of 'arp -a' functionality for a normal user account. (On SunOS 5.x access, it can be modified to allow or disallow remote access
normally should not be able to read. On many systems, this includes











normally should not be able to read. On many systems, this includes loss of 'arp -a' functionality for a normal user account. (On SunOS 5.x











systems, even this functionality isn't lost... there is no reason for access, it can be modified to allow or disallow remote access loss of 'arp -a' functionality for a normal user account. (On SunOS 5.x systems, even this functionality isn't lost... there is no reason for systems, even this functionality isn't lost... there is no reason for 'arp' to be setgid). This is a minor loss of functionality.











'arp' to be setgid). This is a minor loss of functionality. 'arp' to be setgid). This is a minor loss of functionality. systems, even this functionality isn't lost... there is no reason for











/dev/kmem and /dev/mem. Turning the 'setgid' bit off will result in the










'arp' to be setgid). This is a minor loss of functionality.












Code [perm26f]

systems, even this functionality isn't lost... there is no reason for loss of 'arp -a' functionality for a normal user account. (On SunOS 5.x 'arp' to be setgid). This is a minor loss of functionality. loss of 'arp -a' functionality for a normal user account. (On SunOS 5.x /dev/kmem and /dev/mem. Turning the 'setgid' bit off will result in the systems, even this functionality isn't lost... there is no reason for

Code [perm26f]





/dev/kmem and /dev/mem. Turning the 'setgid' bit off will result in the






access, it can be modified to allow or disallow remote access

/dev/kmem and /dev/mem. Turning the 'setgid' bit off will result in the systems, even this functionality isn't lost... there is no reason for systems, even this functionality isn't lost... there is no reason for

Code [perm26f]

Code [perm26f]

/dev/kmem and /dev/mem. Turning the 'setgid' bit off will result in the systems, even this functionality isn't lost... there is no reason for to privileged accounts. If this file is writable by non-root /dev/kmem and /dev/mem. Turning the 'setgid' bit off will result in the 'arp' to be setgid). This is a minor loss of functionality.

Code [perm26f]

to privileged accounts. If this file is writable by non-root systems, even this functionality isn't lost... there is no reason for 'arp' to be setgid). This is a minor loss of functionality.

Code [perm26f]

'arp' to be setgid). This is a minor loss of functionality.























'arp' to be setgid). This is a minor loss of functionality.

Code [perm26f]












Code [perm26f]












systems, even this functionality isn't lost... there is no reason for loss of 'arp -a' functionality for a normal user account. (On SunOS 5.x











The file '/etc/login.access' provides finer control over user 'arp' to be setgid). This is a minor loss of functionality.

Code [perm26f]

systems, even this functionality isn't lost... there is no reason for 'arp' to be setgid). This is a minor loss of functionality. to privileged accounts. If this file is writable by non-root loss of 'arp -a' functionality for a normal user account. (On SunOS 5.x loss of 'arp -a' functionality for a normal user account. (On SunOS 5.x loss of 'arp -a' functionality for a normal user account. (On SunOS 5.x The file '/etc/login.access' provides finer control over user 'arp' to be setgid). This is a minor loss of functionality. The file '/etc/login.access' provides finer control over user 'arp' to be setgid). This is a minor loss of functionality. users, then unauthorized access or privileges may be obtained. The file '/etc/login.access' provides finer control over user 'arp' to be setgid). This is a minor loss of functionality. loss of 'arp -a' functionality for a normal user account. (On SunOS 5.x












loss of 'arp -a' functionality for a normal user account. (On SunOS 5.x

Code [perm26f]

The file '/etc/login.access' provides finer control over user 'arp' to be setgid). This is a minor loss of functionality.


Code [perm26f]


Code [perm26f]

The file '/etc/login.access' provides finer control over user users, then unauthorized access or privileges may be obtained.












The file '/etc/login.access' provides finer control over user











Code [perm26f]

systems, even this functionality isn't lost... there is no reason for

Code [perm26f]

'arp' to be setgid). This is a minor loss of functionality. The file '/etc/login.access' provides finer control over user access, it can be modified to allow or disallow remote access 'arp' to be setgid). This is a minor loss of functionality.



The file '/etc/login.access' provides finer control over user









systems, even this functionality isn't lost... there is no reason for

users, then unauthorized access or privileges may be obtained.










systems, even this functionality isn't lost... there is no reason for systems, even this functionality isn't lost... there is no reason for access, it can be modified to allow or disallow remote access











access, it can be modified to allow or disallow remote access














Code [perm26f]













systems, even this functionality isn't lost... there is no reason for access, it can be modified to allow or disallow remote access

Code [perm26f]

systems, even this functionality isn't lost... there is no reason for

Code [perm26f]

The file '/etc/login.access' provides finer control over user access, it can be modified to allow or disallow remote access The file '/etc/login.access' provides finer control over user

Code [perm26f]












access, it can be modified to allow or disallow remote access The file '/etc/login.access' provides finer control over user











The file '/etc/login.access' provides finer control over user access, it can be modified to allow or disallow remote access 'arp' to be setgid). This is a minor loss of functionality.

Code [perm26f]

The file '/etc/login.access' provides finer control over user











access, it can be modified to allow or disallow remote access to privileged accounts. If this file is writable by non-root

Code [perm26f]












access, it can be modified to allow or disallow remote access 'arp' to be setgid). This is a minor loss of functionality.











'arp' to be setgid). This is a minor loss of functionality.

Code [perm26f]

to privileged accounts. If this file is writable by non-root

Code [perm26f]

'arp' to be setgid). This is a minor loss of functionality.

Code [perm26f]

Code [perm27f]

to privileged accounts. If this file is writable by non-root The file '/etc/login.access' provides finer control over user 'arp' to be setgid). This is a minor loss of functionality. to privileged accounts. If this file is writable by non-root The file '/etc/login.access' provides finer control over user

Code [perm27f]

Code [perm26f]

The file '/etc/login.access' provides finer control over user 'arp' to be setgid). This is a minor loss of functionality. to privileged accounts. If this file is writable by non-root access, it can be modified to allow or disallow remote access The file '/etc/login.access' provides finer control over user to privileged accounts. If this file is writable by non-root access, it can be modified to allow or disallow remote access access, it can be modified to allow or disallow remote access

Code [perm26f]

access, it can be modified to allow or disallow remote access












to privileged accounts. If this file is writable by non-root access, it can be modified to allow or disallow remote access The file '/etc/login.access' provides finer control over user users, then unauthorized access or privileges may be obtained. The file '/etc/login.access' provides finer control over user to privileged accounts. If this file is writable by non-root

Code [perm26f]

Code [perm27f]












to privileged accounts. If this file is writable by non-root






















The file '/etc/login.access' provides finer control over user The file '/etc/login.access' provides finer control over user users, then unauthorized access or privileges may be obtained. The file '/etc/login.conf' is used by default on some BSD systems, The file '/etc/login.access' provides finer control over user users, then unauthorized access or privileges may be obtained.











access, it can be modified to allow or disallow remote access The file '/etc/login.access' provides finer control over user access, it can be modified to allow or disallow remote access users, then unauthorized access or privileges may be obtained. The file '/etc/login.conf' is used by default on some BSD systems,











users, then unauthorized access or privileges may be obtained. to privileged accounts. If this file is writable by non-root

Code [perm26f]

access, it can be modified to allow or disallow remote access access, it can be modified to allow or disallow remote access to privileged accounts. If this file is writable by non-root users, then unauthorized access or privileges may be obtained. The file '/etc/login.access' provides finer control over user to privileged accounts. If this file is writable by non-root access, it can be modified to allow or disallow remote access to privileged accounts. If this file is writable by non-root

Code [perm26f]

users, then unauthorized access or privileges may be obtained.












users, then unauthorized access or privileges may be obtained. to privileged accounts. If this file is writable by non-root

Code [perm26f]

access, it can be modified to allow or disallow remote access The file '/etc/login.access' provides finer control over user

Code [perm26f]

users, then unauthorized access or privileges may be obtained.






The file '/etc/login.conf' is used by default on some BSD systems,






access, it can be modified to allow or disallow remote access access, it can be modified to allow or disallow remote access it can be used to set up user environment and to set policy and access, it can be modified to allow or disallow remote access

Code [perm26f]












to privileged accounts. If this file is writable by non-root

Code [perm26f]

access, it can be modified to allow or disallow remote access


to privileged accounts. If this file is writable by non-root










it can be used to set up user environment and to set policy and











users, then unauthorized access or privileges may be obtained. to privileged accounts. If this file is writable by non-root The file '/etc/login.access' provides finer control over user to privileged accounts. If this file is writable by non-root users, then unauthorized access or privileges may be obtained. access, it can be modified to allow or disallow remote access to privileged accounts. If this file is writable by non-root




users, then unauthorized access or privileges may be obtained.

Code [perm27f]


users, then unauthorized access or privileges may be obtained. users, then unauthorized access or privileges may be obtained. The file '/etc/login.access' provides finer control over user The file '/etc/login.access' provides finer control over user




















access, it can be modified to allow or disallow remote access


to privileged accounts. If this file is writable by non-root

Code [perm27f]

The file '/etc/login.access' provides finer control over user












it can be used to set up user environment and to set policy and

Code [perm27f]

to privileged accounts. If this file is writable by non-root accounting restrictions. Since this file provides control over user The file '/etc/login.access' provides finer control over user to privileged accounts. If this file is writable by non-root to privileged accounts. If this file is writable by non-root

Code [perm27f]

The file '/etc/login.access' provides finer control over user users, then unauthorized access or privileges may be obtained.

Code [perm27f]

to privileged accounts. If this file is writable by non-root users, then unauthorized access or privileges may be obtained. users, then unauthorized access or privileges may be obtained. accounting restrictions. Since this file provides control over user




access, it can be modified to allow or disallow remote access








Code [perm27f]

users, then unauthorized access or privileges may be obtained.












users, then unauthorized access or privileges may be obtained.






















to privileged accounts. If this file is writable by non-root The file '/etc/login.conf' is used by default on some BSD systems,

Code [perm27f]

Code [perm27f]











access, it can be modified to allow or disallow remote access

access, it can be modified to allow or disallow remote access

Code [perm27f]

users, then unauthorized access or privileges may be obtained. The file '/etc/login.conf' is used by default on some BSD systems, to privileged accounts. If this file is writable by non-root access, it can be modified to allow or disallow remote access The file '/etc/login.conf' is used by default on some BSD systems, users, then unauthorized access or privileges may be obtained. access, it can be modified to allow or disallow remote access accounting restrictions. Since this file provides control over user users, then unauthorized access or privileges may be obtained. access, if this file is writable by non-root users, then unauthorized access or privileges may be obtained. The file '/etc/login.conf' is used by default on some BSD systems,












Code [perm27f]

access, it can be modified to allow or disallow remote access users, then unauthorized access or privileges may be obtained.

Code [perm27f]

The file '/etc/login.conf' is used by default on some BSD systems,












access, if this file is writable by non-root







Code [perm27f]



The file '/etc/login.conf' is used by default on some BSD systems, to privileged accounts. If this file is writable by non-root

Code [perm27f]


Code [perm27f]

users, then unauthorized access or privileges may be obtained. The file '/etc/login.conf' is used by default on some BSD systems, The file '/etc/login.conf' is used by default on some BSD systems, to privileged accounts. If this file is writable by non-root The file '/etc/login.conf' is used by default on some BSD systems, to privileged accounts. If this file is writable by non-root it can be used to set up user environment and to set policy and it can be used to set up user environment and to set policy and












users, then unauthorized access or privileges may be obtained. to privileged accounts. If this file is writable by non-root to privileged accounts. If this file is writable by non-root it can be used to set up user environment and to set policy and











access, if this file is writable by non-root











Code [perm27f]












users, then unauthorized access or privileges may be obtained.

Code [perm27f]

to privileged accounts. If this file is writable by non-root The file '/etc/login.conf' is used by default on some BSD systems,












it can be used to set up user environment and to set policy and

Code [perm27f]

Code [perm27f]

Code [perm27f]

users, then unauthorized access or privileges may be obtained. it can be used to set up user environment and to set policy and The file '/etc/login.conf' is used by default on some BSD systems, it can be used to set up user environment and to set policy and The file '/etc/login.conf' is used by default on some BSD systems, users, then unauthorized access or privileges may be obtained. The file '/etc/login.conf' is used by default on some BSD systems, The file '/etc/login.conf' is used by default on some BSD systems,












Code [perm27f]

it can be used to set up user environment and to set policy and it can be used to set up user environment and to set policy and users, then unauthorized access or privileges may be obtained.












it can be used to set up user environment and to set policy and users, then unauthorized access or privileges may be obtained. accounting restrictions. Since this file provides control over user accounting restrictions. Since this file provides control over user

Code [perm27f]

Code [perm27f]

accounting restrictions. Since this file provides control over user users, then unauthorized access or privileges may be obtained.

Code [perm27f]

users, then unauthorized access or privileges may be obtained. users, then unauthorized access or privileges may be obtained. The file '/etc/login.conf' is used by default on some BSD systems,

Code [perm27f]












The file '/etc/login.conf' is used by default on some BSD systems, The file '/etc/login.conf' is used by default on some BSD systems, accounting restrictions. Since this file provides control over user it can be used to set up user environment and to set policy and The file '/etc/login.conf' is used by default on some BSD systems, The file '/etc/login.conf' is used by default on some BSD systems, users, then unauthorized access or privileges may be obtained. it can be used to set up user environment and to set policy and accounting restrictions. Since this file provides control over user

Code [perm27f]























accounting restrictions. Since this file provides control over user it can be used to set up user environment and to set policy and it can be used to set up user environment and to set policy and it can be used to set up user environment and to set policy and accounting restrictions. Since this file provides control over user accounting restrictions. Since this file provides control over user The file '/etc/login.conf' is used by default on some BSD systems,

Code [perm27f]





















The file '/etc/login.conf' is used by default on some BSD systems, accounting restrictions. Since this file provides control over user access, if this file is writable by non-root access, if this file is writable by non-root The file '/etc/login.conf' is used by default on some BSD systems, access, if this file is writable by non-root
The file '/etc/login.conf' is used by default on some BSD systems,
























it can be used to set up user environment and to set policy and









Code [perm28f]

The file '/etc/login.conf' is used by default on some BSD systems, it can be used to set up user environment and to set policy and it can be used to set up user environment and to set policy and access, if this file is writable by non-root accounting restrictions. Since this file provides control over user it can be used to set up user environment and to set policy and











accounting restrictions. Since this file provides control over user

Code [perm28f]

Code [perm27f]

it can be used to set up user environment and to set policy and access, if this file is writable by non-root The file '/etc/login.conf' is used by default on some BSD systems, access, if this file is writable by non-root access, if this file is writable by non-root accounting restrictions. Since this file provides control over user access, if this file is writable by non-root accounting restrictions. Since this file provides control over user

Code [perm27f]

it can be used to set up user environment and to set policy and accounting restrictions. Since this file provides control over user The file '/etc/login.conf' is used by default on some BSD systems,

Code [perm27f]

it can be used to set up user environment and to set policy and users, then unauthorized access or privileges may be obtained. users, then unauthorized access or privileges may be obtained.

Code [perm27f]

Code [perm28f]

access, if this file is writable by non-root

Code [perm27f]

it can be used to set up user environment and to set policy and users, then unauthorized access or privileges may be obtained. it can be used to set up user environment and to set policy and accounting restrictions. Since this file provides control over user The file '/etc/login.defs' is used by default on some Linux systems, accounting restrictions. Since this file provides control over user accounting restrictions. Since this file provides control over user it can be used to set up user environment and to set policy and

Code [perm27f]

accounting restrictions. Since this file provides control over user users, then unauthorized access or privileges may be obtained. access, if this file is writable by non-root access, if this file is writable by non-root The file '/etc/login.defs' is used by default on some Linux systems, users, then unauthorized access or privileges may be obtained. accounting restrictions. Since this file provides control over user The file '/etc/login.conf' is used by default on some BSD systems, it can be used to set up user environment and to set policy and users, then unauthorized access or privileges may be obtained. access, if this file is writable by non-root users, then unauthorized access or privileges may be obtained. The file '/etc/login.conf' is used by default on some BSD systems, access, if this file is writable by non-root users, then unauthorized access or privileges may be obtained. access, if this file is writable by non-root it can be used to set up user environment and to set policy and The file '/etc/login.conf' is used by default on some BSD systems, accounting restrictions. Since this file provides control over user accounting restrictions. Since this file provides control over user























The file '/etc/login.defs' is used by default on some Linux systems, users, then unauthorized access or privileges may be obtained. The file '/etc/login.conf' is used by default on some BSD systems, The file '/etc/login.conf' is used by default on some BSD systems, accounting restrictions. Since this file provides control over user accounting restrictions. Since this file provides control over user



access, if this file is writable by non-root








it can be used to set up user environment and to set policy and access, if this file is writable by non-root accounting restrictions. Since this file provides control over user access, if this file is writable by non-root users, then unauthorized access or privileges may be obtained. access, if this file is writable by non-root The file '/etc/login.conf' is used by default on some BSD systems, users, then unauthorized access or privileges may be obtained. it can be used to set up user environment and to set policy and








access, if this file is writable by non-root













it can be used to set up user environment and to set policy and accounting restrictions. Since this file provides control over user users, then unauthorized access or privileges may be obtained.











it can be used to set up user environment and to set policy and users, then unauthorized access or privileges may be obtained.














Code [perm28f]

users, then unauthorized access or privileges may be obtained.

Code [perm28f]

accounting restrictions. Since this file provides control over user it can be used to set up user environment and to set policy and it can be used to set up user environment and to set policy and


access, if this file is writable by non-root





access, if this file is writable by non-root





it can be used to set up user environment and to set policy and it can be used to set up user environment and to set policy and access, if this file is writable by non-root access, if this file is writable by non-root

Code [perm28f]

users, then unauthorized access or privileges may be obtained. users, then unauthorized access or privileges may be obtained. accounting restrictions (such as password aging), as it defines users, then unauthorized access or privileges may be obtained. access, if this file is writable by non-root

Code [perm28f]












Code [perm28f]












it can be used to set up user environment and to set policy and users, then unauthorized access or privileges may be obtained. accounting restrictions (such as password aging), as it defines users, then unauthorized access or privileges may be obtained.

Code [perm28f]











accounting restrictions. Since this file provides control over user

access, if this file is writable by non-root

Code [perm28f]








Code [perm28f]


accounting restrictions. Since this file provides control over user

Code [perm28f]

The file '/etc/login.defs' is used by default on some Linux systems, access, if this file is writable by non-root accounting restrictions (such as password aging), as it defines












users, then unauthorized access or privileges may be obtained. users, then unauthorized access or privileges may be obtained. accounting restrictions. Since this file provides control over user The file '/etc/login.defs' is used by default on some Linux systems, accounting restrictions. Since this file provides control over user users, then unauthorized access or privileges may be obtained. accounting restrictions. Since this file provides control over user










The file '/etc/login.defs' is used by default on some Linux systems,

users, then unauthorized access or privileges may be obtained.

Code [perm28f]























Code [perm28f]

configuration control definitions for the login package. users, then unauthorized access or privileges may be obtained.

Code [perm28f]

The file '/etc/login.defs' is used by default on some Linux systems, The file '/etc/login.defs' is used by default on some Linux systems, accounting restrictions. Since this file provides control over user The file '/etc/login.defs' is used by default on some Linux systems,

Code [perm28f]
















configuration control definitions for the login package.



access, if this file is writable by non-root
The file '/etc/login.defs' is used by default on some Linux systems,




users, then unauthorized access or privileges may be obtained. The file '/etc/login.defs' is used by default on some Linux systems, access, if this file is writable by non-root

Code [perm28f]

users, then unauthorized access or privileges may be obtained. The file '/etc/login.defs' is used by default on some Linux systems,

it can be used to set up user environment and to set policy and











access, if this file is writable by non-root configuration control definitions for the login package.


Code [perm28f]


it can be used to set up user environment and to set policy and access, if this file is writable by non-root access, if this file is writable by non-root











it can be used to set up user environment and to set policy and

Code [perm28f]

Code [perm28f]












The file '/etc/login.defs' is used by default on some Linux systems, The file '/etc/login.defs' is used by default on some Linux systems,


Since this file provides control over user access, if this file









The file '/etc/login.defs' is used by default on some Linux systems, it can be used to set up user environment and to set policy and

Code [perm28f]

Code [perm28f]

it can be used to set up user environment and to set policy and it can be used to set up user environment and to set policy and access, if this file is writable by non-root The file '/etc/login.defs' is used by default on some Linux systems, users, then unauthorized access or privileges may be obtained. it can be used to set up user environment and to set policy and






Since this file provides control over user access, if this file






it can be used to set up user environment and to set policy and The file '/etc/login.defs' is used by default on some Linux systems, users, then unauthorized access or privileges may be obtained.

Code [perm28f]

Code [perm28f]











Code [perm28f]


it can be used to set up user environment and to set policy and accounting restrictions (such as password aging), as it defines users, then unauthorized access or privileges may be obtained. accounting restrictions (such as password aging), as it defines The file '/etc/login.defs' is used by default on some Linux systems, Since this file provides control over user access, if this file users, then unauthorized access or privileges may be obtained. users, then unauthorized access or privileges may be obtained. The file '/etc/login.defs' is used by default on some Linux systems, The file '/etc/login.defs' is used by default on some Linux systems, accounting restrictions (such as password aging), as it defines

Code [perm28f]

Code [perm28f]

it can be used to set up user environment and to set policy and it can be used to set up user environment and to set policy and is writable by non-root users, then unauthorized access or privileges accounting restrictions (such as password aging), as it defines The file '/etc/login.defs' is used by default on some Linux systems, The file '/etc/login.defs' is used by default on some Linux systems, accounting restrictions (such as password aging), as it defines

Code [perm28f]

accounting restrictions (such as password aging), as it defines it can be used to set up user environment and to set policy and








users, then unauthorized access or privileges may be obtained.




is writable by non-root users, then unauthorized access or privileges accounting restrictions (such as password aging), as it defines it can be used to set up user environment and to set policy and

Code [perm28f]

accounting restrictions (such as password aging), as it defines it can be used to set up user environment and to set policy and The file '/etc/login.defs' is used by default on some Linux systems, configuration control definitions for the login package. accounting restrictions (such as password aging), as it defines is writable by non-root users, then unauthorized access or privileges

















The file '/etc/login.defs' is used by default on some Linux systems,


The file '/etc/login.defs' is used by default on some Linux systems,



configuration control definitions for the login package. it can be used to set up user environment and to set policy and












configuration control definitions for the login package. it can be used to set up user environment and to set policy and The file '/etc/login.defs' is used by default on some Linux systems, it can be used to set up user environment and to set policy and accounting restrictions (such as password aging), as it defines The file '/etc/login.defs' is used by default on some Linux systems, accounting restrictions (such as password aging), as it defines may be obtained. configuration control definitions for the login package. The file '/etc/login.defs' is used by default on some Linux systems, configuration control definitions for the login package. configuration control definitions for the login package. it can be used to set up user environment and to set policy and it can be used to set up user environment and to set policy and

Code [perm28f]

accounting restrictions (such as password aging), as it defines may be obtained.












configuration control definitions for the login package. accounting restrictions (such as password aging), as it defines The file '/etc/login.defs' is used by default on some Linux systems, accounting restrictions (such as password aging), as it defines

Code [perm28f]

Since this file provides control over user access, if this file

Code [perm28f]

it can be used to set up user environment and to set policy and

Code [perm28f]

configuration control definitions for the login package.

Code [perm28f]

it can be used to set up user environment and to set policy and configuration control definitions for the login package. it can be used to set up user environment and to set policy and may be obtained. Since this file provides control over user access, if this file accounting restrictions (such as password aging), as it defines accounting restrictions (such as password aging), as it defines accounting restrictions (such as password aging), as it defines Since this file provides control over user access, if this file it can be used to set up user environment and to set policy and configuration control definitions for the login package. configuration control definitions for the login package. it can be used to set up user environment and to set policy and












it can be used to set up user environment and to set policy and Since this file provides control over user access, if this file Since this file provides control over user access, if this file accounting restrictions (such as password aging), as it defines Since this file provides control over user access, if this file

Code [perm28f]

The file '/etc/login.defs' is used by default on some Linux systems, accounting restrictions (such as password aging), as it defines












configuration control definitions for the login package. configuration control definitions for the login package. The file '/etc/login.defs' is used by default on some Linux systems, configuration control definitions for the login package. Since this file provides control over user access, if this file accounting restrictions (such as password aging), as it defines it can be used to set up user environment and to set policy and is writable by non-root users, then unauthorized access or privileges The file '/etc/login.defs' is used by default on some Linux systems, The file '/etc/login.defs' is used by default on some Linux systems, accounting restrictions (such as password aging), as it defines The file '/etc/login.defs' is used by default on some Linux systems, Since this file provides control over user access, if this file is writable by non-root users, then unauthorized access or privileges Since this file provides control over user access, if this file


configuration control definitions for the login package.









accounting restrictions (such as password aging), as it defines configuration control definitions for the login package.

Code [perm29f]

accounting restrictions (such as password aging), as it defines is writable by non-root users, then unauthorized access or privileges configuration control definitions for the login package. Since this file provides control over user access, if this file accounting restrictions (such as password aging), as it defines Since this file provides control over user access, if this file is writable by non-root users, then unauthorized access or privileges

Code [perm29f]

configuration control definitions for the login package. is writable by non-root users, then unauthorized access or privileges accounting restrictions (such as password aging), as it defines is writable by non-root users, then unauthorized access or privileges it can be used to set up user environment and to set policy and configuration control definitions for the login package. The file '/etc/login.defs' is used by default on some Linux systems, Since this file provides control over user access, if this file Since this file provides control over user access, if this file it can be used to set up user environment and to set policy and configuration control definitions for the login package. Since this file provides control over user access, if this file is writable by non-root users, then unauthorized access or privileges accounting restrictions (such as password aging), as it defines it can be used to set up user environment and to set policy and it can be used to set up user environment and to set policy and may be obtained. configuration control definitions for the login package.

Code [perm29f]

may be obtained. is writable by non-root users, then unauthorized access or privileges Since this file provides control over user access, if this file is writable by non-root users, then unauthorized access or privileges configuration control definitions for the login package. it can be used to set up user environment and to set policy and The configuration files for PAM (Pluggable Authentication Modules) Since this file provides control over user access, if this file Since this file provides control over user access, if this file may be obtained. configuration control definitions for the login package. configuration control definitions for the login package. is writable by non-root users, then unauthorized access or privileges is writable by non-root users, then unauthorized access or privileges The configuration files for PAM (Pluggable Authentication Modules) may be obtained. may be obtained. Since this file provides control over user access, if this file configuration control definitions for the login package. may be obtained. Since this file provides control over user access, if this file accounting restrictions (such as password aging), as it defines it can be used to set up user environment and to set policy and is writable by non-root users, then unauthorized access or privileges accounting restrictions (such as password aging), as it defines is writable by non-root users, then unauthorized access or privileges is writable by non-root users, then unauthorized access or privileges Since this file provides control over user access, if this file configuration control definitions for the login package.








may be obtained.




accounting restrictions (such as password aging), as it defines








accounting restrictions (such as password aging), as it defines



is writable by non-root users, then unauthorized access or privileges Since this file provides control over user access, if this file The configuration files for PAM (Pluggable Authentication Modules) accounting restrictions (such as password aging), as it defines may be obtained. may be obtained. are used by default on many Unix systems, it can be used to set up Since this file provides control over user access, if this file











is writable by non-root users, then unauthorized access or privileges is writable by non-root users, then unauthorized access or privileges may be obtained. Since this file provides control over user access, if this file may be obtained. are used by default on many Unix systems, it can be used to set up Since this file provides control over user access, if this file






















is writable by non-root users, then unauthorized access or privileges configuration control definitions for the login package. is writable by non-root users, then unauthorized access or privileges











accounting restrictions (such as password aging), as it defines Since this file provides control over user access, if this file may be obtained.

Code [perm29f]

may be obtained. Since this file provides control over user access, if this file configuration control definitions for the login package.

Code [perm29f]

may be obtained. is writable by non-root users, then unauthorized access or privileges












configuration control definitions for the login package. configuration control definitions for the login package. may be obtained. configuration control definitions for the login package.

Code [perm29f]

is writable by non-root users, then unauthorized access or privileges are used by default on many Unix systems, it can be used to set up









is writable by non-root users, then unauthorized access or privileges


the environment for some services and defined the policy for its












may be obtained.





may be obtained.






is writable by non-root users, then unauthorized access or privileges is writable by non-root users, then unauthorized access or privileges the environment for some services and defined the policy for its

Code [perm29f]

Code [perm29f]











Code [perm29f]


Since this file provides control over user access, if this file is writable by non-root users, then unauthorized access or privileges configuration control definitions for the login package. may be obtained. may be obtained.











The configuration files for PAM (Pluggable Authentication Modules)

Code [perm29f]








Since this file provides control over user access, if this file




may be obtained. The configuration files for PAM (Pluggable Authentication Modules) Since this file provides control over user access, if this file










Since this file provides control over user access, if this file

Code [perm29f]

is writable by non-root users, then unauthorized access or privileges












Code [perm29f]

Since this file provides control over user access, if this file the environment for some services and defined the policy for its The configuration files for PAM (Pluggable Authentication Modules)

Code [perm29f]

may be obtained.

Code [perm29f]






may be obtained.






may be obtained. access. Since this file provides control over user access, if this file





may be obtained.






access. Since this file provides control over user access, if this file The configuration files for PAM (Pluggable Authentication Modules) The configuration files for PAM (Pluggable Authentication Modules) The configuration files for PAM (Pluggable Authentication Modules)

Code [perm29f]

is writable by non-root users, then unauthorized access or privileges Since this file provides control over user access, if this file may be obtained.

















Code [perm29f]


The configuration files for PAM (Pluggable Authentication Modules) are used by default on many Unix systems, it can be used to set up is writable by non-root users, then unauthorized access or privileges

Code [perm29f]

Code [perm29f]

are used by default on many Unix systems, it can be used to set up is writable by non-root users, then unauthorized access or privileges may be obtained. is writable by non-root users, then unauthorized access or privileges


is writable by non-root users, then unauthorized access or privileges are used by default on many Unix systems, it can be used to set up The configuration files for PAM (Pluggable Authentication Modules) The configuration files for PAM (Pluggable Authentication Modules) access. Since this file provides control over user access, if this file


The configuration files for PAM (Pluggable Authentication Modules)








is writable by non-root users, then unauthorized access or privileges


Code [perm29f]


The configuration files for PAM (Pluggable Authentication Modules)

Code [perm29f]



is writable by non-root users, then unauthorized access or privileges


are used by default on many Unix systems, it can be used to set up

are used by default on many Unix systems, it can be used to set up






are used by default on many Unix systems, it can be used to set up





Code [perm29f]

Code [perm29f]


is writable by non-root users, then unauthorized access or privileges The configuration files for PAM (Pluggable Authentication Modules)

Code [perm29f]

Code [perm29f]

The configuration files for PAM (Pluggable Authentication Modules) may be obtained.










Code [perm29f]


are used by default on many Unix systems, it can be used to set up The configuration files for PAM (Pluggable Authentication Modules) may be obtained. may be obtained. the environment for some services and defined the policy for its

Code [perm29f]

may be obtained.

Code [perm29f]

may be obtained. The configuration files for PAM (Pluggable Authentication Modules) may be obtained. are used by default on many Unix systems, it can be used to set up are used by default on many Unix systems, it can be used to set up may be obtained. is writable by non-root users, then unauthorized access or privileges The configuration files for PAM (Pluggable Authentication Modules) are used by default on many Unix systems, it can be used to set up the environment for some services and defined the policy for its The configuration files for PAM (Pluggable Authentication Modules) are used by default on many Unix systems, it can be used to set up the environment for some services and defined the policy for its the environment for some services and defined the policy for its the environment for some services and defined the policy for its the environment for some services and defined the policy for its

Code [perm29f]

The configuration files for PAM (Pluggable Authentication Modules)

Code [perm29f]

the environment for some services and defined the policy for its may be obtained. The configuration files for PAM (Pluggable Authentication Modules) are used by default on many Unix systems, it can be used to set up are used by default on many Unix systems, it can be used to set up The configuration files for PAM (Pluggable Authentication Modules) The configuration files for PAM (Pluggable Authentication Modules) are used by default on many Unix systems, it can be used to set up are used by default on many Unix systems, it can be used to set up The configuration files for PAM (Pluggable Authentication Modules) The configuration files for PAM (Pluggable Authentication Modules)
























access. Since this file provides control over user access, if this file may be obtained.

the environment for some services and defined the policy for its are used by default on many Unix systems, it can be used to set up the environment for some services and defined the policy for its the environment for some services and defined the policy for its The configuration files for PAM (Pluggable Authentication Modules)








access. Since this file provides control over user access, if this file



access. Since this file provides control over user access, if this file are used by default on many Unix systems, it can be used to set up access. Since this file provides control over user access, if this file access. Since this file provides control over user access, if this file the environment for some services and defined the policy for its access. Since this file provides control over user access, if this file The configuration files for PAM (Pluggable Authentication Modules) access. Since this file provides control over user access, if this file








are used by default on many Unix systems, it can be used to set up



Code [perm29f]

The configuration files for PAM (Pluggable Authentication Modules) the environment for some services and defined the policy for its are used by default on many Unix systems, it can be used to set up

Code [perm29f]

Code [perm29f]

are used by default on many Unix systems, it can be used to set up access. Since this file provides control over user access, if this file the environment for some services and defined the policy for its the environment for some services and defined the policy for its are used by default on many Unix systems, it can be used to set up

Code [perm29f]

Code [perm29f]

the environment for some services and defined the policy for its More information about PAM is available from: are used by default on many Unix systems, it can be used to set up access. Since this file provides control over user access, if this file are used by default on many Unix systems, it can be used to set up is writable by non-root users, then unauthorized access or privileges are used by default on many Unix systems, it can be used to set up is writable by non-root users, then unauthorized access or privileges More information about PAM is available from: is writable by non-root users, then unauthorized access or privileges access. Since this file provides control over user access, if this file is writable by non-root users, then unauthorized access or privileges is writable by non-root users, then unauthorized access or privileges access. Since this file provides control over user access, if this file the environment for some services and defined the policy for its the environment for some services and defined the policy for its is writable by non-root users, then unauthorized access or privileges

Code [perm29f]

is writable by non-root users, then unauthorized access or privileges the environment for some services and defined the policy for its are used by default on many Unix systems, it can be used to set up are used by default on many Unix systems, it can be used to set up The configuration files for PAM (Pluggable Authentication Modules) access. Since this file provides control over user access, if this file The configuration files for PAM (Pluggable Authentication Modules) the environment for some services and defined the policy for its the environment for some services and defined the policy for its the environment for some services and defined the policy for its is writable by non-root users, then unauthorized access or privileges access. Since this file provides control over user access, if this file The configuration files for PAM (Pluggable Authentication Modules) access. Since this file provides control over user access, if this file may be obtained. is writable by non-root users, then unauthorized access or privileges The configuration files for PAM (Pluggable Authentication Modules) access. Since this file provides control over user access, if this file The configuration files for PAM (Pluggable Authentication Modules) http://www.kernel.org/pub/linux/libs/pam/ the environment for some services and defined the policy for its may be obtained. is writable by non-root users, then unauthorized access or privileges may be obtained. the environment for some services and defined the policy for its the environment for some services and defined the policy for its More information about PAM is available from: may be obtained. is writable by non-root users, then unauthorized access or privileges may be obtained. http://www.kernel.org/pub/linux/libs/pam/ access. Since this file provides control over user access, if this file access. Since this file provides control over user access, if this file may be obtained. The configuration files for PAM (Pluggable Authentication Modules) are used by default on many Unix systems, it can be used to set up access. Since this file provides control over user access, if this file the environment for some services and defined the policy for its the environment for some services and defined the policy for its may be obtained. is writable by non-root users, then unauthorized access or privileges are used by default on many Unix systems, it can be used to set up access. Since this file provides control over user access, if this file is writable by non-root users, then unauthorized access or privileges are used by default on many Unix systems, it can be used to set up access. Since this file provides control over user access, if this file may be obtained. access. Since this file provides control over user access, if this file

may be obtained. are used by default on many Unix systems, it can be used to set up is writable by non-root users, then unauthorized access or privileges is writable by non-root users, then unauthorized access or privileges and

are used by default on many Unix systems, it can be used to set up may be obtained. access. Since this file provides control over user access, if this file

access. Since this file provides control over user access, if this file and access. Since this file provides control over user access, if this file http://www.kernel.org/pub/linux/libs/pam/ may be obtained. is writable by non-root users, then unauthorized access or privileges is writable by non-root users, then unauthorized access or privileges

are used by default on many Unix systems, it can be used to set up is writable by non-root users, then unauthorized access or privileges access. Since this file provides control over user access, if this file the environment for some services and defined the policy for its access. Since this file provides control over user access, if this file

may be obtained. is writable by non-root users, then unauthorized access or privileges the environment for some services and defined the policy for its is writable by non-root users, then unauthorized access or privileges

the environment for some services and defined the policy for its More information about PAM is available from:

More information about PAM is available from: is writable by non-root users, then unauthorized access or privileges the environment for some services and defined the policy for its may be obtained. may be obtained. http://www.sun.com/solaris/pam/ may be obtained. the environment for some services and defined the policy for its More information about PAM is available from: More information about PAM is available from: is writable by non-root users, then unauthorized access or privileges More information about PAM is available from: http://www.sun.com/solaris/pam/

is writable by non-root users, then unauthorized access or privileges More information about PAM is available from: and may be obtained. may be obtained. is writable by non-root users, then unauthorized access or privileges the environment for some services and defined the policy for its may be obtained. More information about PAM is available from: is writable by non-root users, then unauthorized access or privileges access. Since this file provides control over user access, if this file is writable by non-root users, then unauthorized access or privileges may be obtained.

may be obtained. access. Since this file provides control over user access, if this file More information about PAM is available from: More information about PAM is available from: access. Since this file provides control over user access, if this file http://www.kernel.org/pub/linux/libs/pam/ may be obtained. http://www.kernel.org/pub/linux/libs/pam/

access. Since this file provides control over user access, if this file

access. Since this file provides control over user access, if this file












http://www.kernel.org/pub/linux/libs/pam/ may be obtained. may be obtained. http://www.kernel.org/pub/linux/libs/pam/ http://www.kernel.org/pub/linux/libs/pam/












More information about PAM is available from: More information about PAM is available from:

http://www.kernel.org/pub/linux/libs/pam/ http://www.sun.com/solaris/pam/ may be obtained.

access. Since this file provides control over user access, if this file may be obtained. is writable by non-root users, then unauthorized access or privileges

may be obtained. http://www.kernel.org/pub/linux/libs/pam/

More information about PAM is available from:

and is writable by non-root users, then unauthorized access or privileges http://www.kernel.org/pub/linux/libs/pam/ http://www.kernel.org/pub/linux/libs/pam/ is writable by non-root users, then unauthorized access or privileges More information about PAM is available from: and More information about PAM is available from:

Code [perm30f]

is writable by non-root users, then unauthorized access or privileges is writable by non-root users, then unauthorized access or privileges

More information about PAM is available from:

Code [perm30f]

and and and

http://www.kernel.org/pub/linux/libs/pam/ http://www.kernel.org/pub/linux/libs/pam/ More information about PAM is available from:












More information about PAM is available from: and is writable by non-root users, then unauthorized access or privileges

may be obtained.

More information about PAM is available from: and http://www.kernel.org/pub/linux/libs/pam/ More information about PAM is available from: More information about PAM is available from: http://www.sun.com/solaris/pam/ and may be obtained. The configuration files (/etc/ttys, /etc/default/login, /etc/security and may be obtained. http://www.kernel.org/pub/linux/libs/pam/ http://www.kernel.org/pub/linux/libs/pam/ may be obtained. http://www.sun.com/solaris/pam/ http://www.kernel.org/pub/linux/libs/pam/ http://www.sun.com/solaris/pam/ More information about PAM is available from:

Code [perm30f]

http://www.sun.com/solaris/pam/ More information about PAM is available from: may be obtained. and http://www.sun.com/solaris/pam/ More information about PAM is available from: The configuration files (/etc/ttys, /etc/default/login, /etc/security More information about PAM is available from: http://www.kernel.org/pub/linux/libs/pam/ and http://www.sun.com/solaris/pam/ http://www.kernel.org/pub/linux/libs/pam/ may be obtained. More information about PAM is available from:

and http://www.sun.com/solaris/pam/ More information about PAM is available from: http://www.kernel.org/pub/linux/libs/pam/ http://www.kernel.org/pub/linux/libs/pam/ http://www.kernel.org/pub/linux/libs/pam/












http://www.sun.com/solaris/pam/ http://www.sun.com/solaris/pam/ or /etc/securetty depending on the operating system) determines

and


and





















and











http://www.kernel.org/pub/linux/libs/pam/ The configuration files (/etc/ttys, /etc/default/login, /etc/security

http://www.kernel.org/pub/linux/libs/pam/ http://www.sun.com/solaris/pam/

http://www.kernel.org/pub/linux/libs/pam/











or /etc/securetty depending on the operating system) determines http://www.kernel.org/pub/linux/libs/pam/ and http://www.sun.com/solaris/pam/ and











http://www.kernel.org/pub/linux/libs/pam/ http://www.sun.com/solaris/pam/ More information about PAM is available from:












and http://www.kernel.org/pub/linux/libs/pam/ and and

Code [perm30f]

More information about PAM is available from:

Code [perm30f]

Code [perm30f]












http://www.sun.com/solaris/pam/ access to users based on what consoles are they logged in.

Code [perm30f]


More information about PAM is available from:










http://www.sun.com/solaris/pam/ http://www.sun.com/solaris/pam/ More information about PAM is available from: and

Code [perm30f]

or /etc/securetty depending on the operating system) determines More information about PAM is available from: and

Code [perm30f]












and and











http://www.sun.com/solaris/pam/ http://www.sun.com/solaris/pam/ access to users based on what consoles are they logged in. More information about PAM is available from: and

Code [perm30f]

http://www.sun.com/solaris/pam/ http://www.kernel.org/pub/linux/libs/pam/

http://www.sun.com/solaris/pam/











and http://www.sun.com/solaris/pam/ http://www.kernel.org/pub/linux/libs/pam/

Code [perm30f]

The configuration files (/etc/ttys, /etc/default/login, /etc/security The configuration files (/etc/ttys, /etc/default/login, /etc/security

Code [perm30f]












The configuration files (/etc/ttys, /etc/default/login, /etc/security http://www.kernel.org/pub/linux/libs/pam/ The configuration files (/etc/ttys, /etc/default/login, /etc/security









Since this file provides control over user access, if this file


The configuration files (/etc/ttys, /etc/default/login, /etc/security http://www.kernel.org/pub/linux/libs/pam/
access to users based on what consoles are they logged in.



http://www.sun.com/solaris/pam/

Code [perm30f]


http://www.kernel.org/pub/linux/libs/pam/

Code [perm30f]

http://www.sun.com/solaris/pam/ The configuration files (/etc/ttys, /etc/default/login, /etc/security












http://www.sun.com/solaris/pam/











Since this file provides control over user access, if this file http://www.kernel.org/pub/linux/libs/pam/ http://www.sun.com/solaris/pam/ http://www.sun.com/solaris/pam/ and The configuration files (/etc/ttys, /etc/default/login, /etc/security






















Code [perm30f]

Code [perm30f]

http://www.sun.com/solaris/pam/ The configuration files (/etc/ttys, /etc/default/login, /etc/security












or /etc/securetty depending on the operating system) determines and or /etc/securetty depending on the operating system) determines The configuration files (/etc/ttys, /etc/default/login, /etc/security

Code [perm30f]

Code [perm30f]

or /etc/securetty depending on the operating system) determines or /etc/securetty depending on the operating system) determines The configuration files (/etc/ttys, /etc/default/login, /etc/security Since this file provides control over user access, if this file or /etc/securetty depending on the operating system) determines is writable by non-root users, then unauthorized access or privileges and

Code [perm30f]

and and























Code [perm30f]

or /etc/securetty depending on the operating system) determines The configuration files (/etc/ttys, /etc/default/login, /etc/security is writable by non-root users, then unauthorized access or privileges












and











Code [perm30f]

http://www.sun.com/solaris/pam/ or /etc/securetty depending on the operating system) determines












Code [perm30f]

Code [perm30f]












or /etc/securetty depending on the operating system) determines The configuration files (/etc/ttys, /etc/default/login, /etc/security access to users based on what consoles are they logged in. The configuration files (/etc/ttys, /etc/default/login, /etc/security http://www.sun.com/solaris/pam/ access to users based on what consoles are they logged in. or /etc/securetty depending on the operating system) determines

Code [perm30f]

The configuration files (/etc/ttys, /etc/default/login, /etc/security The configuration files (/etc/ttys, /etc/default/login, /etc/security access to users based on what consoles are they logged in.

Code [perm30f]

The configuration files (/etc/ttys, /etc/default/login, /etc/security access to users based on what consoles are they logged in. access to users based on what consoles are they logged in. http://www.sun.com/solaris/pam/ or /etc/securetty depending on the operating system) determines may be obtained. http://www.sun.com/solaris/pam/ http://www.sun.com/solaris/pam/ is writable by non-root users, then unauthorized access or privileges

Code [perm30f]

access to users based on what consoles are they logged in. The configuration files (/etc/ttys, /etc/default/login, /etc/security or /etc/securetty depending on the operating system) determines

Code [perm30f]

http://www.sun.com/solaris/pam/

Code [perm30f]

may be obtained. The configuration files (/etc/ttys, /etc/default/login, /etc/security












access to users based on what consoles are they logged in.

Code [perm30f]

The configuration files (/etc/ttys, /etc/default/login, /etc/security access to users based on what consoles are they logged in. or /etc/securetty depending on the operating system) determines The configuration files (/etc/ttys, /etc/default/login, /etc/security or /etc/securetty depending on the operating system) determines Since this file provides control over user access, if this file Since this file provides control over user access, if this file Since this file provides control over user access, if this file access to users based on what consoles are they logged in. or /etc/securetty depending on the operating system) determines












Since this file provides control over user access, if this file or /etc/securetty depending on the operating system) determines or /etc/securetty depending on the operating system) determines access to users based on what consoles are they logged in. The configuration files (/etc/ttys, /etc/default/login, /etc/security Since this file provides control over user access, if this file











The configuration files (/etc/ttys, /etc/default/login, /etc/security may be obtained.













Since this file provides control over user access, if this file or /etc/securetty depending on the operating system) determines The configuration files (/etc/ttys, /etc/default/login, /etc/security access to users based on what consoles are they logged in. The configuration files (/etc/ttys, /etc/default/login, /etc/security











The configuration files (/etc/ttys, /etc/default/login, /etc/security

Code [perm30f]

or /etc/securetty depending on the operating system) determines Since this file provides control over user access, if this file The configuration files (/etc/ttys, /etc/default/login, /etc/security or /etc/securetty depending on the operating system) determines access to users based on what consoles are they logged in. Since this file provides control over user access, if this file or /etc/securetty depending on the operating system) determines access to users based on what consoles are they logged in. is writable by non-root users, then unauthorized access or privileges

Code [perm30f]

Since this file provides control over user access, if this file access to users based on what consoles are they logged in. is writable by non-root users, then unauthorized access or privileges

Code [perm30f]

is writable by non-root users, then unauthorized access or privileges

Code [perm30f]

or /etc/securetty depending on the operating system) determines access to users based on what consoles are they logged in. Since this file provides control over user access, if this file is writable by non-root users, then unauthorized access or privileges or /etc/securetty depending on the operating system) determines access to users based on what consoles are they logged in.

Code [perm30f]

is writable by non-root users, then unauthorized access or privileges access to users based on what consoles are they logged in.

Code [perm30f]

The configuration files (/etc/ttys, /etc/default/login, /etc/security or /etc/securetty depending on the operating system) determines or /etc/securetty depending on the operating system) determines access to users based on what consoles are they logged in. is writable by non-root users, then unauthorized access or privileges is writable by non-root users, then unauthorized access or privileges Since this file provides control over user access, if this file access to users based on what consoles are they logged in. or /etc/securetty depending on the operating system) determines or /etc/securetty depending on the operating system) determines Since this file provides control over user access, if this file access to users based on what consoles are they logged in. may be obtained. Since this file provides control over user access, if this file is writable by non-root users, then unauthorized access or privileges The configuration files (/etc/ttys, /etc/default/login, /etc/security may be obtained. The configuration files (/etc/ttys, /etc/default/login, /etc/security Since this file provides control over user access, if this file may be obtained. is writable by non-root users, then unauthorized access or privileges The configuration files (/etc/ttys, /etc/default/login, /etc/security access to users based on what consoles are they logged in. is writable by non-root users, then unauthorized access or privileges access to users based on what consoles are they logged in. Since this file provides control over user access, if this file access to users based on what consoles are they logged in. The configuration files (/etc/ttys, /etc/default/login, /etc/security may be obtained. Since this file provides control over user access, if this file may be obtained. Since this file provides control over user access, if this file Since this file provides control over user access, if this file is writable by non-root users, then unauthorized access or privileges or /etc/securetty depending on the operating system) determines may be obtained. Since this file provides control over user access, if this file may be obtained. The configuration files (/etc/ttys, /etc/default/login, /etc/security access to users based on what consoles are they logged in. access to users based on what consoles are they logged in. access to users based on what consoles are they logged in. is writable by non-root users, then unauthorized access or privileges Since this file provides control over user access, if this file may be obtained. is writable by non-root users, then unauthorized access or privileges or /etc/securetty depending on the operating system) determines or /etc/securetty depending on the operating system) determines is writable by non-root users, then unauthorized access or privileges Since this file provides control over user access, if this file or /etc/securetty depending on the operating system) determines may be obtained. may be obtained. Since this file provides control over user access, if this file Since this file provides control over user access, if this file is writable by non-root users, then unauthorized access or privileges is writable by non-root users, then unauthorized access or privileges or /etc/securetty depending on the operating system) determines is writable by non-root users, then unauthorized access or privileges is writable by non-root users, then unauthorized access or privileges may be obtained. access to users based on what consoles are they logged in. is writable by non-root users, then unauthorized access or privileges or /etc/securetty depending on the operating system) determines Since this file provides control over user access, if this file Since this file provides control over user access, if this file Since this file provides control over user access, if this file may be obtained. is writable by non-root users, then unauthorized access or privileges may be obtained. access to users based on what consoles are they logged in. may be obtained. is writable by non-root users, then unauthorized access or privileges access to users based on what consoles are they logged in. is writable by non-root users, then unauthorized access or privileges access to users based on what consoles are they logged in. is writable by non-root users, then unauthorized access or privileges may be obtained. access to users based on what consoles are they logged in. may be obtained. may be obtained. may be obtained. may be obtained. is writable by non-root users, then unauthorized access or privileges is writable by non-root users, then unauthorized access or privileges access to users based on what consoles are they logged in. Since this file provides control over user access, if this file may be obtained. is writable by non-root users, then unauthorized access or privileges Since this file provides control over user access, if this file Since this file provides control over user access, if this file may be obtained. Since this file provides control over user access, if this file may be obtained. Since this file provides control over user access, if this file may be obtained. may be obtained. Since this file provides control over user access, if this file may be obtained. is writable by non-root users, then unauthorized access or privileges may be obtained. is writable by non-root users, then unauthorized access or privileges is writable by non-root users, then unauthorized access or privileges is writable by non-root users, then unauthorized access or privileges is writable by non-root users, then unauthorized access or privileges is writable by non-root users, then unauthorized access or privileges may be obtained. may be obtained. may be obtained. may be obtained. may be obtained. may be obtained.