GEN004400 - Files executed through a mail aliases file must be owned by root and must reside within a directory owned and writable only by root.

Information

If a file executed through a mail aliases file is not owned and writable only by root, it may be subject to unauthorized modification. Unauthorized modification of files executed through aliases may allow unauthorized users to attain root privileges.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Edit the /etc/aliases file (alternatively, /usr/lib/sendmail.cf). Locate the entries executing a program. They will appear similar to the following line:

Aliasname: : /usr/local/bin/ls (or some other program name)

Ensure root owns the programs and the directory(ies) they reside in by using the chown command to change owner to root.

Procedure:
# chown root <file or directory name>

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_5_V2R1_STIG.zip

Item Details

Category: ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|AC-6, 800-53|SC-4, CAT|I, CCI|CCI-000225, CCI|CCI-001090, Rule-ID|SV-218535r603259_rule, STIG-ID|GEN004400, STIG-Legacy|SV-63699, STIG-Legacy|V-833, Vuln-ID|V-218535

Plugin: Unix

Control ID: 008110becc2467966074846225d796f60559fd8efd3b8fb88fcce60536dd0d00