======6.1.13 Audit SUID executables (Not Scored)====== =====Profile Applicability===== Level 1 - Server Level 1 - Workstation =====Description===== The owner of a file can set the file's permissions to run with the owner's or group's permissions, even if the user running the program is not the owner or a member of the group. The most common reason for a SUID program is to enable users to perform functions (such as changing their password) that require root privileges.. =====Rationale===== There are valid reasons for SUID programs, but it is important to identify and review such programs to ensure they are legitimate. =====Audit===== Run the following command to list SUID files: # df --local -P | awk {'if (NR!=1) print $6'} | xargs -I '{}' find '{}' -xdev -type f -perm -4000 The command above only searches local filesystems, there may still be compromised items on network mounted partitions. Additionally the ''--local'' option to df is not universal to all versions, it can be omitted to search all filesystems on a system including network mounted filesystems or the following command can be run manually for each partition: # find -xdev -type f -perm -4000 =====Remediation===== Ensure that no rogue SUID programs have been introduced into the system. Review the files returned by the action in the Audit section and confirm the integrity of these binaries.