Check: AIX7-00-003105
IBM AIX 7.x STIG:
AIX7-00-003105
(in versions v3 r1 through v1 r1)
Title
The rwalld daemon must be disabled on AIX. (Cat II impact)
Discussion
The rwalld service allows remote users to broadcast system wide messages. The service runs as root and should be disabled unless absolutely necessary to prevent attacks.
Check Content
From the command prompt, execute the following command: # grep "^rwalld[[:blank:]]" /etc/inetd.conf If there is any output from the command, this is a finding.
Fix Text
In "/etc/inetd.conf", comment out the "rwalld" entry by running command: # chsubserver -r inetd -C /etc/inetd.conf -d -v 'rwalld' -p 'udp' Restart inetd: # refresh -s inetd
Additional Identifiers
Rule ID: SV-215406r958478_rule
Vulnerability ID: V-215406
Group Title: SRG-OS-000095-GPOS-00049
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000381 |
Configure the system to provide only organization-defined mission essential capabilities. |
Controls
Number | Title |
---|---|
CM-7 |
Least Functionality |