Check: GEN004430
Solaris 10 X86 STIG:
GEN004430
(in versions v2 r4 through v1 r17)
Title
Files executed through a mail aliases file must not have extended ACLs. (Cat II impact)
Discussion
Excessive permissions on files executed through a mail alias file could result in modification by an unauthorized user, execution of malicious code, and/or system compromise.
Check Content
Examine the contents of the /etc/mail/aliases file. For each file referenced, check the permissions of the file. # ls -lL [file referenced from aliases] If the permissions include a "+", the file has an extended ACL and this is a finding.
Fix Text
Remove the extended ACL from the file. # chmod A- [file referenced from aliases]
Additional Identifiers
Rule ID: SV-227842r603266_rule
Vulnerability ID: V-227842
Group Title: SRG-OS-000480
Expert Comments
Expert comments are only available to logged-in users.
CCIs
CCIs tied to check.
Number | Definition |
---|---|
CCI-000366 |
The organization implements the security configuration settings. |
Controls
Controls tied to check. These are derived from the CCIs shown above.
Number | Title |
---|---|
CM-6 |
Configuration Settings |