STIGQter STIGQter: STIG Summary: VMware vRealize Automation 7.x SLES Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 28 Sep 2018:

Files executed through a mail aliases file must be owned by root and must reside within a directory owned and writable only by root.

DISA Rule

SV-100299r1_rule

Vulnerability Number

V-89649

Group Title

SRG-OS-000096-GPOS-00050

Rule Version

VRAU-SL-000575

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Edit the /etc/aliases file (alternatively, /usr/lib/sendmail.cf). Locate the entries executing a program. They will appear similar to the following line:

Aliasname: : /usr/local/bin/ls (or some other program name)

Ensure "root" owns the programs and the directory or directories they reside in by using the "chown" command to change owner to "root":

# chown root <file or directory name>

Check Contents

Verify the ownership of files referenced within the sendmail aliases file:

# more /etc/aliases

Examine the aliases file for any directories or paths used:

# ls -lL <directory or file path>

Check the owner for any paths referenced.

If the file or parent directory is not owned by "root", this is a finding.

Vulnerability Number

V-89649

Documentable

False

Rule Version

VRAU-SL-000575

Severity Override Guidance

Verify the ownership of files referenced within the sendmail aliases file:

# more /etc/aliases

Examine the aliases file for any directories or paths used:

# ls -lL <directory or file path>

Check the owner for any paths referenced.

If the file or parent directory is not owned by "root", this is a finding.

Check Content Reference

M

Target Key

3459

Comments