Check: SLEM-05-432025
SUSE Linux Enterprise Micro (SLEM) 5 STIG:
SLEM-05-432025
(in version v1 r1)
Title
SLEM 5 must restrict privilege elevation to authorized personnel. (Cat II impact)
Discussion
The sudo command allows a user to execute programs with elevated (administrator) privileges. It prompts the user for their password and confirms the request to execute a command by checking a file, called sudoers. If the "sudoers" file is not configured correctly, any user defined on the system can initiate privileged actions on the target system.
Check Content
Verify the "sudoers" file restricts sudo access to authorized personnel with the following command: > sudo grep -iw 'ALL' /etc/sudoers /etc/sudoers.d/* root ALL=(ALL) ALL If "ALL ALL=(ALL) ALL" or "ALL ALL=(ALL:ALL) ALL" entries are returned, this is a finding.
Fix Text
Remove the following entries from the "/etc/sudoers" file: ALL ALL=(ALL) ALL ALL ALL=(ALL:ALL) ALL
Additional Identifiers
Rule ID: SV-261375r996562_rule
Vulnerability ID: V-261375
Group Title: SRG-OS-000480-GPOS-00227
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000366 |
Implement the security configuration settings. |
Controls
Number | Title |
---|---|
CM-6 |
Configuration Settings |