OL6-00-000198 - The audit system must be configured to audit all use of setuid and setgid programs.

Information

Privileged programs are subject to escalation-of-privilege attacks, which attempt to subvert their normal role of providing some necessary but limited capability. As such, motivation exists to monitor these programs for unusual activity.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

At a minimum, the audit system should collect the execution of privileged commands for all users and root. To find the relevant setuid / setgid programs, run the following command for each local partition [PART]:

$ sudo find [PART] -xdev -type f -perm /6000 2>/dev/null

Then, for each setuid / setgid program on the system, add a line of the following form to '/etc/audit/audit.rules', where [SETUID_PROG_PATH] is the full path to each setuid / setgid program in the list:

-a always,exit -F path=[SETUID_PROG_PATH] -F perm=x -F auid>=500 -F auid!=4294967295 -k privileged

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_6_V2R7_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-6(9), CAT|III, CCI|CCI-002234, Rule-ID|SV-219556r854343_rule, STIG-ID|OL6-00-000198, STIG-Legacy|SV-65351, STIG-Legacy|V-51141, Vuln-ID|V-219556

Plugin: Unix

Control ID: 00ad6b7d241f796e99605ed81339d930c33af14d8c72b7b71bd36a0bfff71fbe