Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-22365 | GEN002210 | SV-63697r1_rule | Medium |
Description |
---|
If shell files are group-owned by users other than root or a system group, they could be modified by intruders or malicious users to perform unauthorized actions. |
STIG | Date |
---|---|
Oracle Linux 5 Security Technical Implementation Guide | 2018-03-01 |
Check Text ( C-52299r1_chk ) |
---|
If /etc/shells exists, check the group ownership of each shell referenced. Procedure: # cat /etc/shells | xargs -n1 ls -l Otherwise, check any shells found on the system. Procedure: # find / -name "*sh" | xargs -n1 ls -l If a shell is not group-owned by root, bin, sys, or system, this is a finding. |
Fix Text (F-54279r2_fix) |
---|
Change the group-owner of the shell to root, bin, sys, or system. Procedure: # chgrp root |