Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-227837 | GEN004360 | SV-227837r505926_rule | Medium |
Description |
---|
If the alias file is not owned by root, an unauthorized user may modify the file to add aliases to run malicious code or redirect email. |
STIG | Date |
---|---|
Solaris 10 X86 Security Technical Implementation Guide | 2020-09-04 |
Check Text ( C-29999r489883_chk ) |
---|
Find the alias file on the system. Procedure: # egrep '^O(A| AliasFile)' /etc/mail/sendmail.cf If the "alias file" is an NIS or LDAP map, this check is not applicable. The default location is /etc/mail/aliases. Check the ownership of the alias file. Procedure: # ls -lL If the alias file is not owned by root, this is a finding. |
Fix Text (F-29987r489884_fix) |
---|
Change the owner of the /etc/mail/aliases file (or equivalent, such as /usr/lib/aliases) to root. Procedure: # chown root /etc/mail/aliases |