UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The traceroute command must be group-owned by sys, bin, root, or system.


Overview

Finding ID Version Rule ID IA Controls Severity
V-4370 GEN003980 SV-63511r1_rule ECLP-1 Medium
Description
If the group owner of the traceroute command has not been set to a system group, unauthorized users could have access to the command and use it to gain information regarding a network's topology inside of the firewall. This information may allow an attacker to determine trusted routers and other network information potentially leading to system and network compromise.
STIG Date
Oracle Linux 5 Security Technical Implementation Guide 2015-03-26

Details

Check Text ( C-52189r1_chk )
Check the group ownership of the traceroute file.

Procedure:
# ls -lL /bin/traceroute

If the traceroute command is not group-owned by root, sys, bin, or system, this is a finding.
Fix Text (F-54115r1_fix)
Change the group-owner of the traceroute command to root.

Procedure:
# chgrp root /bin/traceroute