AIX7-00-003010 - All library files must not have extended ACLs - /usr/lib/methods

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Unauthorized access could destroy the integrity of the library files.

Solution

Remove the extended ACL(s) from the system library file(s) and disable extended permissions using the follow script:

find /usr/lib/security /usr/lib/methods/ -type f | while read file
do
aclget -o /tmp/111.acl $file > /dev/null 2>&1
if [ $? -eq 0 ]; then
grep -e '[[:space:]]enabled$' /tmp/111.acl > /dev/null 2>&1
if [ $? -eq 0 ]; then
echo 'Removing ACL from '$file
cat /tmp/111.acl | head -n9 > /tmp/222.acl
echo ' disabled' >> /tmp/222.acl
aclput -i /tmp/222.acl $file
fi
fi
done

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_IBM_AIX_7-x_V2R5_STIG.zip

Item Details

References: CAT|II, CCI|CCI-001499, Rule-ID|SV-215326r508663_rule, STIG-ID|AIX7-00-003010, STIG-Legacy|SV-101579, STIG-Legacy|V-91481, Vuln-ID|V-215326

Plugin: Unix

Control ID: bab73548a9ebe030f023d4172183b54379045ad4fbe83def4511c21184e846e2