Check: GEN001190
Solaris 10 SPARC STIG:
GEN001190
(in versions v2 r4 through v1 r19)
Title
All network services daemon files must not have extended ACLs. (Cat II impact)
Discussion
Restricting permission on daemons will protect them from unauthorized modification and possible system compromise.
Check Content
Verify network services daemon files have no extended ACLs. # ls -la /usr/sbin # ls -la /usr/bin If the permissions include a "+", the file has an extended ACL and this is a finding. NOTE: Network daemons not residing in these directories (such as httpd or sshd) must also be checked for the correct permissions. A way to locate network daemons, such as httpd and sshd, is with the ps command. # ps -ef | egrep '(sshd|httpd)'
Fix Text
Remove the extended ACL from the file. # chmod A- [file with extended ACL]
Additional Identifiers
Rule ID: SV-226488r603265_rule
Vulnerability ID: V-226488
Group Title: SRG-OS-000480
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000366 |
The organization implements the security configuration settings. |
Controls
Number | Title |
---|---|
CM-6 |
Configuration Settings |