UCF STIG Viewer Logo

All system command files must be owned by root.


Overview

Finding ID Version Rule ID IA Controls Severity
V-208825 OL6-00-000048 SV-208825r793610_rule Medium
Description
System binaries are executed by privileged users as well as system services, and restrictive permissions are necessary to ensure that their execution of these programs cannot be co-opted.
STIG Date
Oracle Linux 6 Security Technical Implementation Guide 2021-12-03

Details

Check Text ( C-9078r357455_chk )
System executables are stored in the following directories by default:

/bin
/usr/bin
/usr/local/bin
/sbin
/usr/sbin
/usr/local/sbin

To find system executables that are not owned by "root", run the following command for each directory [DIR] which contains system executables:

$ find -L [DIR] \! -user root

If any system executables are found to not be owned by root, this is a finding.
Fix Text (F-9078r357456_fix)
System executables are stored in the following directories by default:

/bin
/usr/bin
/usr/local/bin
/sbin
/usr/sbin
/usr/local/sbin

If any file [FILE] in these directories is found to be owned by a user other than root, correct its ownership with the following command:

# chown root [FILE]