Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-38567 | RHEL-06-000198 | SV-50368r2_rule | Low |
Description |
---|
Privileged programs are subject to escalation-of-privilege attacks, which attempt to subvert their normal role of providing some necessary but limited capability. As such, motivation exists to monitor these programs for unusual activity. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 6 Security Technical Implementation Guide | 2014-06-11 |
Check Text ( C-46125r4_chk ) |
---|
To verify that auditing of privileged command use is configured, run the following command once for each local partition [PART] to find relevant setuid programs: # find [PART] -xdev -type f \( -perm -4000 -o -perm -2000 \) 2>/dev/null Run the following command to verify entries in the audit rules for all programs found with the previous command: # grep [path] /etc/audit/audit.rules It should be the case that all relevant setuid programs have a line in the audit rules. If it is not the case, this is a finding. |
Fix Text (F-43515r3_fix) |
---|
At a minimum, the audit system should collect the execution of privileged commands for all users and root. To find the relevant setuid programs run the following command for each local partition [PART]: # find [PART] -xdev -type f \( -perm -4000 -o -perm -2000 \) 2>/dev/null Then, for each setuid program on the system, add a line of the following form to "/etc/audit/audit.rules", where [SETUID_PROG_PATH] is the full path to each setuid program in the list: -a always,exit -F path=[SETUID_PROG_PATH] -F perm=x -F auid>=500 -F auid!=4294967295 -k privileged |