OL6-00-000278 - The system package management tool must verify permissions on all files and directories associated with the audit package.

Information

Permissions on audit binaries and configuration files that are too generous could allow an unauthorized user to gain privileges that they should not have. The permissions set by the vendor should be maintained. Any deviations from this baseline should be investigated.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

The RPM package management system can restore file access permissions of the audit package files and directories. The following command will update audit files with permissions different from what is expected by the RPM database:

# rpm --setperms audit

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_6_V2R7_STIG.zip

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-9, CAT|II, CCI|CCI-001493, Rule-ID|SV-209014r793735_rule, STIG-ID|OL6-00-000278, STIG-Legacy|SV-65069, STIG-Legacy|V-50863, Vuln-ID|V-209014

Plugin: Unix

Control ID: cf18142e8f27e80fb8a8d7ba32d7c469e4be7bba2650060261da74a3ac02b079