Check: GEN002230
Solaris 9 X86 STIG:
GEN002230
(in version v1 r9)
Title
All shell files must not have extended ACLs. (Cat II impact)
Discussion
Shells with world/group write permissions give the ability to maliciously modify the shell to obtain unauthorized access.
Check Content
If /etc/shells exists, check the permissions of each shell referenced. # cat /etc/shells | xargs -n1 ls -lL Otherwise, check any shells found on the system. # find / -name "*sh" | xargs -n1 ls -lL If the permissions include a "+", the file has an extended ACL, this is a finding.
Fix Text
Remove the extended ACL from the file. # getfacl [shell] Remove each ACE returned. # setfacl -d [ACE] [shell]
Additional Identifiers
Rule ID: SV-26491r1_rule
Vulnerability ID: V-22366
Group Title:
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000225 |
Employ the principle of least privilege, allowing only authorized accesses for users (or processes acting on behalf of users) which are necessary to accomplish assigned organizational tasks. |
Controls
Number | Title |
---|---|
AC-6 |
Least Privilege |