Check: AIX7-00-003105
IBM AIX 7.x STIG:
AIX7-00-003105
(in versions v2 r9 through v1 r1)
Title
The rwalld daemon must be disabled on AIX. (Cat II impact)
Discussion
The rwalld service allows remote users to broadcast system wide messages. The service runs as root and should be disabled unless absolutely necessary to prevent attacks.
Check Content
From the command prompt, execute the following command: # grep "^rwalld[[:blank:]]" /etc/inetd.conf If there is any output from the command, this is a finding.
Fix Text
In "/etc/inetd.conf", comment out the "rwalld" entry by running command: # chsubserver -r inetd -C /etc/inetd.conf -d -v 'rwalld' -p 'udp' Restart inetd: # refresh -s inetd
Additional Identifiers
Rule ID: SV-215406r508663_rule
Vulnerability ID: V-215406
Group Title: SRG-OS-000095-GPOS-00049
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000381 |
The organization configures the information system to provide only essential capabilities. |
Controls
Number | Title |
---|---|
CM-7 |
Least Functionality |