UCF STIG Viewer Logo

The alias files must be group-owned by root or a system group.


Overview

Finding ID Version Rule ID IA Controls Severity
V-240434 VRAU-SL-000565 SV-240434r671043_rule Medium
Description
If the aliases and aliases.db file are not group owned by root or a system group, an unauthorized user may modify one or both of the files to add aliases to run malicious code or redirect email.
STIG Date
VMware vRealize Automation 7.x SLES Security Technical Implementation Guide 2021-06-24

Details

Check Text ( C-43667r671041_chk )
Check the group-ownership of the alias files:

# ls -lL /etc/aliases
# ls -lL /etc/aliases.db

If the files are not group-owned by "root", this is a finding.
Fix Text (F-43626r671042_fix)
Change the group-owner of the alias files to "root":

# chgrp root /etc/aliases
# chgrp root /etc/aliases.db