Check: GEN001180
Solaris 10 SPARC STIG:
GEN001180
(in versions v2 r4 through v1 r19)
Title
All network services daemon files must have mode 0755 or less permissive. (Cat II impact)
Discussion
Restricting permission on daemons will protect them from unauthorized modification and possible system compromise.
Check Content
Check the mode of network services daemons. # ls -la /usr/bin /usr/sbin If the mode of a network services daemon is more permissive than 0755, this is a finding. NOTE: Network daemons not residing in these directories (such as httpd or sshd) must also be checked for the correct permissions. A way to locate network daemons, such as httpd and sshd, is with the ps command. # ps -ef | egrep '(sshd|httpd)'
Fix Text
Change the mode of the network services daemon. # chmod 0755 <path>
Additional Identifiers
Rule ID: SV-226487r854407_rule
Vulnerability ID: V-226487
Group Title: SRG-OS-000312
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-002165 |
The information system enforces organization-defined discretionary access control policies over defined subjects and objects. |
Controls
Number | Title |
---|---|
AC-3 (4) |
Discretionary Access Control |