Check: GEN004430
VMware ESX 3 Server:
GEN004430
(in version v1 r2)
Title
Files executed through a mail aliases file must not have extended ACLs. (Cat II impact)
Discussion
Excessive permissions on files executed through a mail alias file could result in modification by an unauthorized user, execution of malicious code, and/or system compromise.
Check Content
Examine the contents of the /etc/mail/aliases file. For each file referenced, check the permissions of the file. # ls -lL [file referenced from aliases] If the permissions include a "+", the file has an extended ACL and this is a finding.
Fix Text
Remove the extended ACL from the file(s) referenced from the aliases file.
Additional Identifiers
Rule ID: SV-26110r1_rule
Vulnerability ID: V-22441
Group Title: GEN004430
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000225 |
Employ the principle of least privilege, allowing only authorized accesses for users (or processes acting on behalf of users) which are necessary to accomplish assigned organizational tasks. |
Controls
Number | Title |
---|---|
AC-6 |
Least Privilege |