Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-4369 | GEN003960 | SV-45818r1_rule | Medium |
Description |
---|
If the traceroute command owner has not been set to root, an unauthorized user could use this command to obtain knowledge of the network topology inside the firewall. This information may allow an attacker to determine trusted routers and other network information potentially leading to system and network compromise. |
STIG | Date |
---|---|
SUSE Linux Enterprise Server v11 for System z | 2016-12-20 |
Check Text ( C-43139r1_chk ) |
---|
# ls -lL /usr/sbin/traceroute If the traceroute command is not owned by root, this is a finding. |
Fix Text (F-39206r1_fix) |
---|
Change the owner of the traceroute command to root. Example: # chown root /usr/sbin/traceroute |