1.3.2 Ensure sudo commands use pty

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

sudo can be configured to run only from a pseudo-pty

Note: visudo edits the sudoers file in a safe fashion, analogous to vipw(8). visudo locks the sudoers file against multiple simultaneous edits, provides basic sanity checks, and checks for parse errors. If the sudoers file is currently being edited you will receive a message to try again later. The -f option allows you to tell visudo which file to edit.

Rationale:

Attackers can run a malicious program using sudo, which would again fork a background process that remains even when the main program has finished executing.

This can be mitigated by configuring sudo to run other commands only from a pseudo-pty, whether I/O logging is turned on or not.

Solution

Edit the file /etc/sudoers or a file in /etc/sudoers.d/ with visudo or visudo -f <PATH TO FILE> and add the following line:

Defaults use_pty

References:

SUDO(8)

See Also

https://workbench.cisecurity.org/files/2948

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-3(7), CSCv7|4

Plugin: Unix

Control ID: a21845c02e0dc6e56fcac4e69b7d72e03f95a389ca918bf9fa2db0c190ce9281