GEN004410 - Files executed through a mail aliases file must be group-owned by root, bin, or sys, and must reside within a directory group-owned by root, bin, or sys.

Information

If a file executed through a mail aliases file is not group-owned by root or a system group, it may be subject to unauthorized modification. Unauthorized modification of files executed through aliases may allow unauthorized users to attain root privileges.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Change the group ownership of the file referenced from /etc/mail/aliases.

Procedure:
# chgrp root <file referenced from aliases>

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_10_SPARC_V2R1_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-3(4), CAT|II, CCI|CCI-000366, Rule-ID|SV-226934r505925_rule, STIG-ID|GEN004410, STIG-Legacy|SV-39904, STIG-Legacy|V-22440, Vuln-ID|V-226934

Plugin: Unix

Control ID: e5f904c74adcea9f89924d94048afd96d1cc123062f83e663b0f159fba71d889