[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CCE
view XML

CCE-18240-2

Platform: rhel5Date: (C)2011-10-07   (M)2022-10-10



All rsyslog log files should be owned by the appropriate group.


Parameter:

group


Technical Mechanism:

via chown

CCSS Severity:CCSS Metrics:
CCSS Score : Attack Vector:
Exploit Score: Attack Complexity:
Impact Score: Privileges Required:
Severity: User Interaction:
Vector: Scope:
 Confidentiality:
 Integrity:
 Availability:
  

References:
Resource IdReference
NSA "Guide to the Secure Configuration of Red Hat Enterprise Linux 5" - Revision 4, September 14, 2010Section: 2.6.1.2.4 - Confirm Existence and Permissions of Log Files
SCAP Repo OVAL Definitionoval:gov.nist.usgcb.rhel:def:20150


CPE    1
cpe:/o:redhat:enterprise_linux:5
OVAL    1
oval:gov.nist.usgcb.rhel:def:20150
XCCDF    1
xccdf_gov.nist_benchmark_USGCB-RHEL-5-Desktop

© SecPod Technologies