Check: GEN001200
Title
All system command files must have mode 755 or less permissive. (Cat II impact)
Discussion
Restricting permissions will protect system command files from unauthorized modification. System command files include files present in directories used by the operating system for storing default system executables and files present in directories included in the system's default executable search paths.
Check Content
Check the permissions for files in /etc, /bin, /usr/bin, /usr/lbin, /usr/ucb, /sbin, and /usr/sbin. Procedure: # find /etc /bin /usr/bin /usr/lbin /usr/ucb /sbin /usr/sbin -perm -0722 -type f -o -perm -0720 -type f -o -perm -0702 -type f -exec ls -ld {} \; If any command file is listed and has a mode more permissive than 755, this is a finding. Note: Elevate to Severity Code I if any command file listed is world-writable.
Fix Text
Change the mode for system command files to 755 or less permissive. Procedure: # chmod 755 <filename>
Additional Identifiers
Rule ID:
Vulnerability ID: V-794
Group Title:
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001499 |
The organization limits privileges to change software resident within software libraries. |
Controls
Number | Title |
---|---|
CM-5 (6) |
Limit Library Privileges |