GEN004410 - Files executed through a mail aliases file must be group-owned by root, bin, sys, or system, and must reside within a directory group-owned by root, bin, sys, or system.

Information

If a file executed through a mail aliases file is not group-owned by root or a system group, it may be subject to unauthorized modification. Unauthorized modification of files executed through aliases may allow unauthorized users to attain root privileges.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Change the group ownership of the file referenced from /etc/aliases.

Procedure:
# chgrp root <file referenced from aliases>

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_5_V2R1_STIG.zip

Item Details

Category: ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|AC-6, 800-53|SC-4, CAT|II, CCI|CCI-000225, CCI|CCI-001090, Rule-ID|SV-218536r603259_rule, STIG-ID|GEN004410, STIG-Legacy|SV-63719, STIG-Legacy|V-22440, Vuln-ID|V-218536

Plugin: Unix

Control ID: a72f7d4f5d71d583ea49ff24dd694e04bb95e8a538eaf2c8c175aa11bea5f294