Check: GEN003502
Solaris 10 X86 STIG:
GEN003502
(in versions v2 r4 through v1 r17)
Title
The centralized process core dump data directory must be owned by root. (Cat III impact)
Discussion
Process core dumps contain the memory in use by the process when it crashed. Any data the process was handling may be contained in the core file, and it must be protected accordingly. If the centralized process core dump data directory is not owned by root, the core dumps contained in the directory may be subject to unauthorized access.
Check Content
Check the defined directory for process core dumps. # coreadm | grep "global core file pattern" OR # grep COREADM_GLOB_PATTERN /etc/coreadm.conf Check the ownership of the directory. # ls -lLd [core file directory] If the directory is not owned by root, this is a finding.
Fix Text
Change the owner of the core file directory. # chown root [core file directory]
Additional Identifiers
Rule ID: SV-227782r603266_rule
Vulnerability ID: V-227782
Group Title: SRG-OS-000480
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000366 |
The organization implements the security configuration settings. |
Controls
Number | Title |
---|---|
CM-6 |
Configuration Settings |