UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The alias files must be group-owned by root or a system group.


Overview

Finding ID Version Rule ID IA Controls Severity
V-240434 VRAU-SL-000565 SV-240434r671043_rule Medium
Description
If the aliases and aliases.db file are not group owned by root or a system group, an unauthorized user may modify one or both of the files to add aliases to run malicious code or redirect email.
STIG Date
VMware vRealize Automation 7.x SLES Security Technical Implementation Guide 2023-09-22

Details

Check Text ( C-43667r671041_chk )
Check the group-ownership of the alias files:

# ls -lL /etc/aliases
# ls -lL /etc/aliases.db

If the files are not group-owned by "root", this is a finding.
Fix Text (F-43626r671042_fix)
Change the group-owner of the alias files to "root":

# chgrp root /etc/aliases
# chgrp root /etc/aliases.db