Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-4369 | GEN003960 | SV-37463r1_rule | ECLP-1 | Medium |
Description |
---|
If the traceroute command owner has not been set to root, an unauthorized user could use this command to obtain knowledge of the network topology inside the firewall. This information may allow an attacker to determine trusted routers and other network information potentially leading to system and network compromise. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 5 Security Technical Implementation Guide | 2017-01-27 |
Check Text ( None ) |
---|
None |
Fix Text (F-31373r1_fix) |
---|
Change the owner of the traceroute command to root. Example: # chown root /bin/traceroute |