OL6-00-000198 - The audit system must be configured to audit all use of setuid and setgid programs.

Information

Privileged programs are subject to escalation-of-privilege attacks, which attempt to subvert their normal role of providing some necessary but limited capability. As such, motivation exists to monitor these programs for unusual activity.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

At a minimum, the audit system should collect the execution of privileged commands for all users and root. To find the relevant setuid / setgid programs, run the following command for each local partition [PART]:

$ sudo find [PART] -xdev -type f -perm /6000 2>/dev/null

Then, for each setuid / setgid program on the system, add a line of the following form to '/etc/audit/audit.rules', where [SETUID_PROG_PATH] is the full path to each setuid / setgid program in the list:

-a always,exit -F path=[SETUID_PROG_PATH] -F perm=x -F auid>=500 -F auid!=4294967295 -k privileged

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_6_V1R17_STIG.zip

Item Details

References: CAT|III, CCI|CCI-000040, Group-ID|V-51141, Rule-ID|SV-65351r2_rule, STIG-ID|OL6-00-000198, Vuln-ID|V-51141

Plugin: Unix

Control ID: 1d893ac46c792d1d9bfa1920d224c11118b06a1ab1dd558ce3eef2eb146cb3f7