Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-22440 | GEN004410 | SV-37493r1_rule | ECLP-1 | Medium |
Description |
---|
If a file executed through a mail aliases file is not group-owned by root or a system group, it may be subject to unauthorized modification. Unauthorized modification of files executed through aliases may allow unauthorized users to attain root privileges. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 5 Security Technical Implementation Guide | 2015-03-12 |
Check Text ( C-36150r1_chk ) |
---|
Examine the contents of the /etc/aliases file. Procedure: # more /etc/aliases Examine the aliases file for any utilized directories or paths. # ls -lL Check the permissions for any paths referenced. If the group owner of any file is not root, bin, sys, or system, this is a finding. |
Fix Text (F-31401r1_fix) |
---|
Change the group ownership of the file referenced from /etc/aliases. Procedure: # chgrp root |