Check: GEN001190
Solaris 10 X86 STIG:
GEN001190
(in versions v2 r4 through v1 r17)
Title
All network services daemon files must not have extended ACLs. (Cat II impact)
Discussion
Restricting permission on daemons will protect them from unauthorized modification and possible system compromise.
Check Content
Verify network services daemon files have no extended ACLs. # ls -la /usr/sbin # ls -la /usr/bin If the permissions include a "+", the file has an extended ACL and this is a finding. NOTE: Network daemons not residing in these directories (such as httpd or sshd) must also be checked for the correct permissions. A way to locate network daemons, such as httpd and sshd, is with the ps command. # ps -ef | egrep '(sshd|httpd)'
Fix Text
Remove the extended ACL from the file. # chmod A- [file with extended ACL]
Additional Identifiers
Rule ID: SV-227614r603266_rule
Vulnerability ID: V-227614
Group Title: SRG-OS-000480
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000366 |
The organization implements the security configuration settings. |
Controls
Number | Title |
---|---|
CM-6 |
Configuration Settings |