Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-4370 | GEN003980 | SV-45819r1_rule | Medium |
Description |
---|
If the group owner of the traceroute command has not been set to a system group, unauthorized users could have access to the command and use it to gain information regarding a network's topology inside of the firewall. This information may allow an attacker to determine trusted routers and other network information potentially leading to system and network compromise. |
STIG | Date |
---|---|
SUSE Linux Enterprise Server v11 for System z | 2017-08-25 |
Check Text ( C-43140r1_chk ) |
---|
Check the group ownership of the traceroute file. Procedure: # ls -lL /usr/sbin/traceroute If the traceroute command is not group-owned by root, sys, bin, or system, this is a finding. |
Fix Text (F-39207r1_fix) |
---|
Change the group-owner of the traceroute command to root. Procedure: # chgrp root /usr/sbin/traceroute |