STIGQter STIGQter: STIG Summary: SUSE Linux Enterprise Server 15 Security Technical Implementation Guide Version: 1 Release: 2 Benchmark Date: 23 Apr 2021:

The SUSE operating system must use the invoking user's password for privilege escalation when using "sudo".

DISA Rule

SV-234879r622137_rule

Vulnerability Number

V-234879

Group Title

SRG-OS-000480-GPOS-00227

Rule Version

SLES-15-020103

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Define the following in the Defaults section of the /etc/sudoers file or a configuration file in the /etc/sudoers.d/ directory:

Defaults !targetpw
Defaults !rootpw
Defaults !runaspw

Check Contents

Verify that the sudoers security policy is configured to use the invoking user's password for privilege escalation.

> sudo egrep -i '(!rootpw|!targetpw|!runaspw)' /etc/sudoers /etc/sudoers.d/* | grep -v '#'

/etc/sudoers:Defaults !targetpw
/etc/sudoers:Defaults !rootpw
/etc/sudoers:Defaults !runaspw

If no results are returned, this is a finding
If "Defaults !targetpw" is not defined, this is a finding.
If "Defaults !rootpw" is not defined, this is a finding.
If "Defaults !runaspw" is not defined, this is a finding.

Vulnerability Number

V-234879

Documentable

False

Rule Version

SLES-15-020103

Severity Override Guidance

Verify that the sudoers security policy is configured to use the invoking user's password for privilege escalation.

> sudo egrep -i '(!rootpw|!targetpw|!runaspw)' /etc/sudoers /etc/sudoers.d/* | grep -v '#'

/etc/sudoers:Defaults !targetpw
/etc/sudoers:Defaults !rootpw
/etc/sudoers:Defaults !runaspw

If no results are returned, this is a finding
If "Defaults !targetpw" is not defined, this is a finding.
If "Defaults !rootpw" is not defined, this is a finding.
If "Defaults !runaspw" is not defined, this is a finding.

Check Content Reference

M

Target Key

5274

Comments