Check: GEN005480
AIX 6.1 SECURITY TECHNICAL IMPLEMENTATION GUIDE:
GEN005480
(in versions v1 r14 through v1 r10)
Title
The syslog daemon must not accept remote messages unless it is a syslog server documented using site-defined procedures. (Cat II impact)
Discussion
Unintentionally running a syslog server that accepts remote messages puts the system at increased risk. Malicious syslog messages sent to the server could exploit vulnerabilities in the server software itself, could introduce misleading information in to the system's logs, or could fill the system's storage leading to a Denial of Service.
Check Content
Verify syslogd is running with the -R option. #ps -ef | grep syslogd | grep -v grep If the -R option is not present, this is a finding.
Fix Text
Change the syslogd arguments in the src subsystem control and restart the syslogd daemon. # chssys -s syslogd -a '-R' # stopsrc -s syslogd # startsrc -s syslogd
Additional Identifiers
Rule ID: SV-38894r1_rule
Vulnerability ID: V-12021
Group Title: GEN005480
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000366 |
The organization implements the security configuration settings. |
Controls
Number | Title |
---|---|
CM-6 |
Configuration Settings |