[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CCE
view XML

CCE-92300-3

Platform: cpe:/o:amazon:linux, cpe:/o:amazon:linux:2Date: (C)2018-10-29   (M)2023-07-06



System-wide shared library files, which are linked to executables during process load time or run time, are stored in the following directories by default: /lib /lib64 /usr/lib /usr/lib64 Kernel modules, which can be added to the kernel during runtime, are also stored in '/lib/modules'. All files in these directories should be owned by the 'root' user. If the directory, or any file in these directories, is found to be owned by a user other than root correct its ownership with the following command: '$ sudo chown root FILE'


Parameter:

[Share_Lib_files_have_Root_Ownership/Share_Lib_files_does_not_have_Root_Ownership]


Technical Mechanism:

Files from shared library directories are loaded into the address space of processes (including privileged ones) or of the kernel itself at runtime. Proper ownership is necessary to protect the integrity of the system.

CCSS Severity:CCSS Metrics:
CCSS Score : 7.8Attack Vector: LOCAL
Exploit Score: 1.8Attack Complexity: LOW
Impact Score: 5.9Privileges Required: LOW
Severity: HIGHUser Interaction: NONE
Vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HScope: UNCHANGED
 Confidentiality: HIGH
 Integrity: HIGH
 Availability: HIGH
  

References:
Resource IdReference
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:48487
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:49006


OVAL    2
oval:org.secpod.oval:def:49006
oval:org.secpod.oval:def:48487
XCCDF    2
xccdf_org.secpod_benchmark_general_Amazon_Linux_AMI
xccdf_org.secpod_benchmark_general_Amazon_Linux_2

© SecPod Technologies