Korean
<< Back
VID 14116
Severity 40
Port 22
Protocol TCP
Class LSC
Detailed Description A file with Set User-ID (SUID) and Set Group-ID (SGID) (especially if it is a file owned by root) can cause root privilege acquisition and normal service failure by executing specific commands. It

is necessary to thoroughly manage security. In case of SUID file owned by root, SUID and SGID attributes are removed except for necessary files, and it is required to periodically diagnose and

manage whether or not it is erroneously set to be a security threat.

* Affected platforms:
UNIX, Linux
Recommendation You can remove SUID and SGID attributes as follows.

1. How to remove
#chmod -s <file_name>
2. Periodic auditing methods
#find / -user root -type f \ (-perm -04000 -o -perm -02000 \) -xdev -exec ls -al {} \;
3. How to restrict use to specific groups only when necessary
Restrict the use of setuid for general users (only for groups)
# /usr/bin/chgrp <group_name> <setuid_file_name>
# /usr/bin/chmod 4750 <setuid_file_name>
Related URL (CVE)
Related URL (SecurityFocus)
Related URL (ISS)