4.7.1.5 Ensure CDE daemons have sgid and suid mode disabled

Information

CDE buffer overflow vulnerabilities may be exploited by a local user to obtain root privilege via suid / sgid programs owned by root:bin or root:sys

CDE has been associated with major security risks, most of which are buffer overflow vulnerabilities. These vulnerabilities may be exploited by a local user to obtain root privilege via suid / sgid programs owned by root:bin or root:sys It is recommended that the CDE binaries have the suid / sgid removed.

Solution

Remove the suid / sgid from the following CDE binaries:

chmod ug-s /usr/dt/bin/dtaction
chmod ug-s /usr/dt/bin/dtappgather
chmod ug-s /usr/dt/bin/dtprintinfo
chmod ug-s /usr/dt/bin/dtsession

See Also

https://workbench.cisecurity.org/benchmarks/10385

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6, 800-53|CM-7, CSCv7|9.2

Plugin: Unix

Control ID: 8e1a3636076d4f89a3cd08f42fc94845699ff7434e4b3967edfe948b4ed71ff8