Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-209071 | OL6-00-000528 | SV-209071r603263_rule | Medium |
Description |
---|
Allowing users to execute binaries from world-writable directories such as "/tmp" should never be necessary in normal operation and can expose the system to potential compromise. |
STIG | Date |
---|---|
Oracle Linux 6 Security Technical Implementation Guide | 2020-12-04 |
Check Text ( C-9324r357998_chk ) |
---|
To verify that binaries cannot be directly executed from the /tmp directory, run the following command: $ grep '\s/tmp' /etc/fstab The resulting output will show whether the /tmp partition has the "noexec" flag set. If the /tmp partition does not have the noexec flag set, this is a finding. |
Fix Text (F-9324r357999_fix) |
---|
The "noexec" mount option can be used to prevent binaries from being executed out of "/tmp". Add the "noexec" option to the fourth column of "/etc/fstab" for the line which controls mounting of "/tmp". |