CCE-95789-4Platform: cpe:/o:ubuntu:ubuntu_linux:20.04 | Date: (C)2024-02-12 (M)2024-02-12 |
Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. The sudoedit command is used to edit files with elevated privileges using sudo.
Fixtext:
Add or update the following rules in the "/etc/audit/rules.d/stig.rules":
-a always,exit -F path=/usr/bin/sudoedit -F perm=x -F auid>=1000 -F auid!=4294967295 -k priv_cmd
To reload the rules file, issue the following command:
$ sudo augenrules --load
Parameter:
[Yes/No]
Technical Mechanism:
Add or update the following rules in the "/etc/audit/rules.d/stig.rules":
-a always,exit -F path=/usr/bin/sudoedit -F perm=x -F auid =1000 -F auid!=4294967295 -k priv_cmd
To reload the rules file, issue the following command:
$ sudo augenrules --load
CCSS Severity: | CCSS Metrics: |
CCSS Score : 5.9 | Attack Vector: LOCAL |
Exploit Score: 2.5 | Attack Complexity: LOW |
Impact Score: 3.4 | Privileges Required: NONE |
Severity: MEDIUM | User Interaction: NONE |
Vector: AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L | Scope: UNCHANGED |
| Confidentiality: LOW |
| Integrity: LOW |
| Availability: LOW |
| |
References: Resource Id | Reference |
---|
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:97842 |