Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-22599 | GEN000000-SOL00110 | SV-27003r1_rule | ECLP-1 | Medium |
Description |
---|
Audit_user is a sensitive file that, if compromised, would allow a malicious user to select auditing parameters to ignore their sessions. This would allow malicious operations the auditing subsystem would not detect for that user. It could also result in long-term system compromise possibly leading to the compromise of other systems and networks. |
STIG | Date |
---|---|
Solaris 9 SPARC Security Technical Implementation Guide | 2012-05-25 |
Check Text ( C-27946r1_chk ) |
---|
Check the permissions of the file. # ls -lL /etc/security/audit_user If the permissions of the file contain a "+", an extended ACL is present, this is a finding. |
Fix Text (F-24269r1_fix) |
---|
Remove the extended ACL from the file. # getfacl /etc/security/audit_user Remove each ACE returned. # setfacl -d [ACE] /etc/security/audit_user |