STIGQter STIGQter: STIG Summary: VMware vRealize Operations Manager 6.x SLES Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 28 Sep 2018:

Files executed through a mail aliases file must be owned by root and must reside within a directory owned and writable only by root.

DISA Rule

SV-99181r1_rule

Vulnerability Number

V-88531

Group Title

SRG-OS-000096-GPOS-00050

Rule Version

VROM-SL-000555

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Edit the "/etc/aliases" file (alternatively, /usr/lib/sendmail.cf). Locate the entries executing a program. They will appear similar to the following line:

Aliasname: : /usr/local/bin/ls (or some other program name)

Ensure "root" owns the programs and the directory(ies) they reside in by using the chown command to change owner to "root":

# chown root <file or directory name>

Check Contents

Verify the ownership of files referenced within the sendmail aliases file:

# more /etc/aliases

Examine the aliases file for any utilized directories or paths:

# ls -lL <directory or file path>

Check the owner for any paths referenced. Check if the file or parent directory is owned by root.

If the file or parent directory is not owned by "root", this is a finding.

Vulnerability Number

V-88531

Documentable

False

Rule Version

VROM-SL-000555

Severity Override Guidance

Verify the ownership of files referenced within the sendmail aliases file:

# more /etc/aliases

Examine the aliases file for any utilized directories or paths:

# ls -lL <directory or file path>

Check the owner for any paths referenced. Check if the file or parent directory is owned by root.

If the file or parent directory is not owned by "root", this is a finding.

Check Content Reference

M

Target Key

3461

Comments