4.16.1 General Permissions Management - suid and sgid files and programs

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The system is audited for both suid and sgid files and programs.

An audit should be performed on the system to search for the presence of both suid and sgid files and programs. In order to prevent these files from being potentially exploited the suid and sgid permissions should be removed wherever possible.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Review the currently mounted filesystems-

mount

Un-mount all non-local filesystems and cdrom media-

unmount <mount point>

If there are non-local filesystems which cannot be un-mounted, use the following to find all suid and sgidfiles on local JFS/JFS2 filesystems only-

find / ( -fstype jfs -o -fstype jfs2 ) ( -perm -04000 -o -perm -02000 ) -type f -ls

If all non-local filesystems have been un-mounted-

find / ( -perm -04000 -o -perm -02000 ) -type f -ls

Review the files and where possible, use the chmod command to remove the appropriate suid or sgid bits-

chmod u-s <file>
chmod g-s <file>

See Also

https://workbench.cisecurity.org/files/528