[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248585

 
 

909

 
 

195621

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CCE
view XML

CCE-55026-9

Platform: cpe:/o:redhat:enterprise_linux:8Date: (C)2024-01-08   (M)2024-01-08



Title: Ensure noexec option set on /var partition Description: The noexec mount option specifies that the filesystem cannot contain executable binaries. Rationale: Since the /var filesystem is only intended for variable files such as logs, set this option to ensure that users cannot run executable binaries from /var . Audit: Verify that the noexec option is set for the /var mount. Run the following command to verify that the noexec mount option is set. Example: # findmnt --kernel /var | grep noexec /var /dev/sdb ext4 rw,nosuid,nodev,noexec,relatime,seclabel Remediation: Edit the /etc/fstab file and add noexec to the fourth field (mounting options) for the /var partition. Example: <device> /var <fstype> defaults,rw,nosuid,nodev,noexec,relatime 0 0 Run the following command to remount /var with the configured options: # mount -o remount /var


Parameter:

[Yes/No]


Technical Mechanism:

Remediation: Edit the /etc/fstab file and add noexec to the fourth field (mounting options) for the /var partition. Example: <device> /var <fstype> defaults,rw,nosuid,nodev,noexec,relatime 0 0 Run the following command to remount /var with the configured options: # mount -o remount /var

CCSS Severity:CCSS Metrics:
CCSS Score : 7.8Attack Vector: LOCAL
Exploit Score: 1.1Attack Complexity: HIGH
Impact Score: 6.0Privileges Required: LOW
Severity: HIGHUser Interaction: NONE
Vector: AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:HScope: CHANGED
 Confidentiality: HIGH
 Integrity: HIGH
 Availability: HIGH
  

References:
Resource IdReference
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:96273


OVAL    1
oval:org.secpod.oval:def:96273
XCCDF    1
xccdf_org.secpod_benchmark_general_RHEL_8

© SecPod Technologies