GEN004400 - Files executed through an aliases file must be owned by root and reside within a directory owned and writable only by root.

Information

If a file executed through a mail aliases file is not owned and writable only by root, it may be subject to unauthorized modification. Unauthorized modification of files executed through aliases may allow unauthorized users to attain root privileges.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Edit the /etc/aliases file (alternatively, /usr/lib/sendmail.cf). Locate the entries executing a program. They will appear similar to the following line:

Aliasname: : /usr/local/bin/ls (or some other program name)

Ensure root owns the programs and the directory(ies) they reside in by using the chown command to change owner to root.
Procedure:
# chown root <file or directory name>

See Also

http://iasecontent.disa.mil/stigs/zip/U_RedHat_5_V1R18_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-6, CAT|I, CCI|CCI-000225, Group-ID|V-833, Rule-ID|SV-37491r1_rule, STIG-ID|GEN004400, Vuln-ID|V-833

Plugin: Unix

Control ID: a4286e98beb76203a8c94d01ad34dad4a25272f729863e22c5916e0e43475029