Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-4370 | GEN003980 | SV-37464r1_rule | ECLP-1 | Medium |
Description |
---|
If the group owner of the traceroute command has not been set to a system group, unauthorized users could have access to the command and use it to gain information regarding a network's topology inside of the firewall. This information may allow an attacker to determine trusted routers and other network information potentially leading to system and network compromise. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 5 Security Technical Implementation Guide | 2015-03-12 |
Check Text ( C-36130r1_chk ) |
---|
Check the group ownership of the traceroute file. Procedure: # ls -lL /bin/traceroute If the traceroute command is not group-owned by root, sys, bin, or system, this is a finding. |
Fix Text (F-31375r1_fix) |
---|
Change the group-owner of the traceroute command to root. Procedure: # chgrp root /bin/traceroute |